Cryptographic Key Exchange Using Blockchain Technology
DOI:
https://doi.org/10.32792/jeps.v14i1.385الملخص
Abstract:
Cryptographic key management systems (KMS) are an important component of secure communications
systems and organisations must protect sensitive information by maintaining confidentiality, integrity,
and reliability. In this paper, we create an efficient cryptographic key management application that uses
blockchain technology (BC) and fingerprint biometrics to meet this demand. A private network of ten
authorised users is created according to the Fingerprint Verification Competition 2000 (FVC2000)
database. They create and exchange encrypted keys according to security standards that include
confidentiality, authenticity, trust, and limited access to the system. The system requires each authorized
user to log in using their email and password, in addition to their fingerprint.
The fingerprint is converted to binary if it is grayscale. If the fingerprint already exists in binary format, the system will extract the fingerprint features in matrix form by processing any missing or incorrect
information with an emphasis on accurate representation. A 256-bit encrypted key is produced from this
matrix after feature retrieval, by converting the feature matrix into a long string which is then fed through
the secure hash algorithm 256 (SHA256) function. The app uses blockchain technology to encrypt the
key, apply additional encryption, and associate it with a unique hash. The encrypted key is contained within a block. Users then securely exchange this encrypted block. The application strictly accepts
authorised users and rejects unauthorised users. The encryption KMS application provides a high level of
security and reliability for organizations looking to protect their encryption keys by combining the use of
fingerprint biometrics and BC technology.
المراجع
S. S. Chaeikar, M. Alizadeh, M. H. Tadayon, and A. Jolfaei, “An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems,” Int. J. Intell. Syst., vol. 37, no. 12, pp. 10158–10171, 2022.
T. W. van der Schaaf, “a Framework for Designing Near Miss Management Systems,” Near Miss Report. As a Saf. Tool, no. April, pp. 27–34, 1991, doi: 10.1016/b978-0-7506-1178- 7.50007-1.
M. A. Engelhardt, “Hitching healthcare to the chain: An introduction to blockchain technology in the healthcare sector,” Technol. Innov. Manag. Rev., vol. 7, no. 10, 2017.
C. M. Bruhner, O. Linnarsson, M. Nemec, M. Arlitt, and N. Carlsson, “Changing of the guards: Certificate and public key management on the internet,” in International Conference on Passive and Active Network Measurement, Springer, 2022, pp. 50–80.
S. Barman, S. Chattopadhyay, and D. Samanta, “An approach to cryptographic key distribution through fingerprint based key distribution center,” Proc. 2014 Int. Conf. Adv. Comput. Commun. Informatics, ICACCI 2014, no. November, pp. 1629–1635, 2014, doi: 10.1109/ICACCI.2014.6968299.
V. Ribeiro, R. Holanda, A. Ramos, and J. J. P. C. Rodrigues, “Enhancing key management in LoRaWAN with permissioned blockchain,” Sensors, vol. 20, no. 11, p. 3068, 2020
C. Jia, H. Ding, C. Zhang, and X. Zhang, “Design of a dynamic key management plan for intelligent building energy management system based on wireless sensor network and blockchain technology,” Alexandria Eng. J., vol. 60, no. 1, pp. 337–346, 2021, doi: 10.1016/j.aej.2020.08.019.
O. Pal, B. Alam, V. Thakur, and S. Singh, “Key management for blockchain technology,” ICT express, vol. 7, no. 1, pp. 76–80, 2021.
R. Fotohi and F. S. Aliee, “Securing communication between things using blockchain technology based on authentication and SHA-256 to improving scalability in large-scale IoT,” Comput. Networks, vol. 197, p. 108331, 2021.
Q. Liu, L. Luo, J. Wang, W. Li, R. Liu, and M. Yu, “Key management scheme of distributed IoT devices based on blockchains,” IET Commun., 2023.
M. J. Mihaljević, M. Knežević, D. Urošević, L. Wang, and S. Xu, “An Approach for Blockchain and Symmetric Keys Broadcast Encryption Based Access Control in IoT,” Symmetry (Basel)., vol. 15, no. 2, p. 299, 2023.
Q. Xiao and H. Raafat, “Fingerprint image postprocessing: a combined statistical and structural approach,” Pattern Recognit., vol. 24, no. 10, pp. 985–992, 1991.
J. Abraham, P. Kwan, and J. Gao, “Fingerprint Matching using A Hybrid Shape and Orientation Descriptor,” State art Biometrics, no. June 2014, 2011, doi: 10.5772/19105.
A. M. Bazen and S. H. Gerez, “Fingerprint matching by thin-plate spline modelling of elastic deformations,” Pattern Recognit., vol. 36, no. 8, pp. 1859–1867, 2003.
P. Kwan and J. Gao, “Fingerprint matching using a hybrid shape and orientation descriptorAbraham, Joshua,” State art Biometrics, pp. 25–56, 2011.
J. Hilton, “The Hex Factor: The NIST Hash Function Competition”.
R. C. Merkle, “A digital signature based on a conventional encryption function,” in Conference on the theory and application of cryptographic techniques, Springer, 1987, pp. 369–378.
A. Yadav, “Comprehensive Study on Incorporation of Blockchain Technology With IoT Enterprises,” 2021, pp. 22–33. doi: 10.4018/978-1-7998-3295-9.ch002.
S. S. Panda, D. Jena, B. K. Mohanta, S. Ramasubbareddy, M. Daneshmand, and A. H. Gandomi, “Authentication and Key Management in Distributed IoT Using Blockchain Technology,” IEEE Internet Things J., vol. 8, no. 16, pp. 12947–12954, 2021, doi: 10.1109/JIOT.2021.3063806.
H. Tan and I. Chung, “Secure authentication and key management with blockchain in VANETs,” IEEE access, vol. 8, pp. 2482–2498, 2019.
التنزيلات
منشور
إصدار
القسم
الرخصة
الحقوق الفكرية (c) 2024 Journal of Education for Pure Science- University of Thi-Qar
هذا العمل مرخص بموجب Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
The Authors understand that, the copyright of the articles shall be assigned to Journal of education for Pure Science (JEPS), University of Thi-Qar as publisher of the journal.
Copyright encompasses exclusive rights to reproduce and deliver the article in all form and media, including reprints, photographs, microfilms and any other similar reproductions, as well as translations. The reproduction of any part of this journal, its storage in databases and its transmission by any form or media, such as electronic, electrostatic and mechanical copies, photocopies, recordings, magnetic media, etc. , will be allowed only with a written permission from Journal of education for Pure Science (JEPS), University of Thi-Qar.
Journal of education for Pure Science (JEPS), University of Thi-Qar, the Editors and the Advisory International Editorial Board make every effort to ensure that no wrong or misleading data, opinions or statements be published in the journal. In any way, the contents of the articles and advertisements published in the Journal of education for Pure Science (JEPS), University of Thi-Qar are sole and exclusive responsibility of their respective authors and advertisers.