Cryptographic Key Exchange Using Blockchain Technology

المؤلفون

  • Fatima Muhsin Naeem
  • Kadhim H. Alibraheem

DOI:

https://doi.org/10.32792/jeps.v14i1.385

الملخص

Abstract:
Cryptographic key management systems (KMS) are an important component of secure communications
systems and organisations must protect sensitive information by maintaining confidentiality, integrity,
and reliability. In this paper, we create an efficient cryptographic key management application that uses
blockchain technology (BC) and fingerprint biometrics to meet this demand. A private network of ten
authorised users is created according to the Fingerprint Verification Competition 2000 (FVC2000)
database. They create and exchange encrypted keys according to security standards that include
confidentiality, authenticity, trust, and limited access to the system. The system requires each authorized
user to log in using their email and password, in addition to their fingerprint.
The fingerprint is converted to binary if it is grayscale. If the fingerprint already exists in binary format, the system will extract the fingerprint features in matrix form by processing any missing or incorrect
information with an emphasis on accurate representation. A 256-bit encrypted key is produced from this
matrix after feature retrieval, by converting the feature matrix into a long string which is then fed through
the secure hash algorithm 256 (SHA256) function. The app uses blockchain technology to encrypt the
key, apply additional encryption, and associate it with a unique hash. The encrypted key is contained within a block. Users then securely exchange this encrypted block. The application strictly accepts
authorised users and rejects unauthorised users. The encryption KMS application provides a high level of
security and reliability for organizations looking to protect their encryption keys by combining the use of
fingerprint biometrics and BC technology.

المراجع

S. S. Chaeikar, M. Alizadeh, M. H. Tadayon, and A. Jolfaei, “An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems,” Int. J. Intell. Syst., vol. 37, no. 12, pp. 10158–10171, 2022.

T. W. van der Schaaf, “a Framework for Designing Near Miss Management Systems,” Near Miss Report. As a Saf. Tool, no. April, pp. 27–34, 1991, doi: 10.1016/b978-0-7506-1178- 7.50007-1.

M. A. Engelhardt, “Hitching healthcare to the chain: An introduction to blockchain technology in the healthcare sector,” Technol. Innov. Manag. Rev., vol. 7, no. 10, 2017.

C. M. Bruhner, O. Linnarsson, M. Nemec, M. Arlitt, and N. Carlsson, “Changing of the guards: Certificate and public key management on the internet,” in International Conference on Passive and Active Network Measurement, Springer, 2022, pp. 50–80.

S. Barman, S. Chattopadhyay, and D. Samanta, “An approach to cryptographic key distribution through fingerprint based key distribution center,” Proc. 2014 Int. Conf. Adv. Comput. Commun. Informatics, ICACCI 2014, no. November, pp. 1629–1635, 2014, doi: 10.1109/ICACCI.2014.6968299.

V. Ribeiro, R. Holanda, A. Ramos, and J. J. P. C. Rodrigues, “Enhancing key management in LoRaWAN with permissioned blockchain,” Sensors, vol. 20, no. 11, p. 3068, 2020

C. Jia, H. Ding, C. Zhang, and X. Zhang, “Design of a dynamic key management plan for intelligent building energy management system based on wireless sensor network and blockchain technology,” Alexandria Eng. J., vol. 60, no. 1, pp. 337–346, 2021, doi: 10.1016/j.aej.2020.08.019.

O. Pal, B. Alam, V. Thakur, and S. Singh, “Key management for blockchain technology,” ICT express, vol. 7, no. 1, pp. 76–80, 2021.

R. Fotohi and F. S. Aliee, “Securing communication between things using blockchain technology based on authentication and SHA-256 to improving scalability in large-scale IoT,” Comput. Networks, vol. 197, p. 108331, 2021.

Q. Liu, L. Luo, J. Wang, W. Li, R. Liu, and M. Yu, “Key management scheme of distributed IoT devices based on blockchains,” IET Commun., 2023.

M. J. Mihaljević, M. Knežević, D. Urošević, L. Wang, and S. Xu, “An Approach for Blockchain and Symmetric Keys Broadcast Encryption Based Access Control in IoT,” Symmetry (Basel)., vol. 15, no. 2, p. 299, 2023.

Q. Xiao and H. Raafat, “Fingerprint image postprocessing: a combined statistical and structural approach,” Pattern Recognit., vol. 24, no. 10, pp. 985–992, 1991.

J. Abraham, P. Kwan, and J. Gao, “Fingerprint Matching using A Hybrid Shape and Orientation Descriptor,” State art Biometrics, no. June 2014, 2011, doi: 10.5772/19105.

A. M. Bazen and S. H. Gerez, “Fingerprint matching by thin-plate spline modelling of elastic deformations,” Pattern Recognit., vol. 36, no. 8, pp. 1859–1867, 2003.

P. Kwan and J. Gao, “Fingerprint matching using a hybrid shape and orientation descriptorAbraham, Joshua,” State art Biometrics, pp. 25–56, 2011.

J. Hilton, “The Hex Factor: The NIST Hash Function Competition”.

R. C. Merkle, “A digital signature based on a conventional encryption function,” in Conference on the theory and application of cryptographic techniques, Springer, 1987, pp. 369–378.

A. Yadav, “Comprehensive Study on Incorporation of Blockchain Technology With IoT Enterprises,” 2021, pp. 22–33. doi: 10.4018/978-1-7998-3295-9.ch002.

S. S. Panda, D. Jena, B. K. Mohanta, S. Ramasubbareddy, M. Daneshmand, and A. H. Gandomi, “Authentication and Key Management in Distributed IoT Using Blockchain Technology,” IEEE Internet Things J., vol. 8, no. 16, pp. 12947–12954, 2021, doi: 10.1109/JIOT.2021.3063806.

H. Tan and I. Chung, “Secure authentication and key management with blockchain in VANETs,” IEEE access, vol. 8, pp. 2482–2498, 2019.

التنزيلات

منشور

2024-03-01