ВЫЧИСЛИТЕЛЬНЫЕ СИСТЕМЫ И СЕТИ
ПРОГРАММНЫЕ СИСТЕМЫ
МАТЕМАТИЧЕСКОЕ МОДЕЛИРОВАНИЕ И АНАЛИЗ ДАННЫХ
ЭКСПЕРТНЫЕ СИСТЕМЫ
ИНТЕЛЛЕКТУАЛЬНЫЕ СИСТЕМЫ
А.Е. Сулавко, А.В. Еременко, Е.В. Толкачева, С.С. Жумажанова "Нечеткий экстрактор для генерации ключей шифрования на основе параметров клавиатурного почерка"
ПРИКЛАДНЫЕ АСПЕКТЫ ИНФОРМАТИКИ
А.Е. Сулавко, А.В. Еременко, Е.В. Толкачева, С.С. Жумажанова "Нечеткий экстрактор для генерации ключей шифрования на основе параметров клавиатурного почерка"

Аннотация.

Статья посвящена проблеме генерации ключевых последовательностей на основе клавиатурного почерка пользователей компьютерных систем. В рамках проведенного исследования предложено несколько вариаций нечетких экстракторов для решения выдвинутых задач. Проведена серия вычислительных экспериментов по оценке эффективности предложенных методик, определены оптимальные параметры нечетких экс-тракторов.

Ключевые слова:

нечеткие экстракторы, генерация криптографических ключей на основе биометрических данных, распознавание образов, клавиатурный почерк, идентифицирующие признаки

Стр. 69-79.

А.E. Sulavko, A.V. Eremenko, E.V. Tolkacheva, S. S. Zhumazhanova

"Fuzzy extractor for generating the encryption key based on the parameters of keystroke dynamics"

Abstract. The article is devoted to the generation of key sequences on the basis of keystroke dynamics of users of computer systems. As part of the study suggested several variations of fuzzy extractors to solve the problems put forward. A series of numerical experiments to assess the effectiveness of the proposed methods have been done, the optimal parameters of fuzzy extractors have been defined.

Keywords: fuzzy extractors, generate cryptographic keys based on biometrics, pattern recognition, keystroke dynamics, identifying features.

REFERENCES

1. Upravlenie kiberriskami vo vzaimosvyazannom mire. Osnovnye rezultaty Globalnogo issledovaniya po voprosam obespecheniya informatsionnoy bezopasnosti. Perspektivy na 2015 god [Management of cyber risks in the interconnected world. The main results of a global survey on information security. Perspectives for 2015].
PricewaterhouseCoopers. Rezhim dostupa: http://www.pwc.ru/ru_RU/ru/riskassurance/publications/assets/managing-cyberrisks.pdf.
2. Utechki konfidentsialnoy informatsii. Predvaritelnye itogi 2014 goda [Confidential information leakage. Preliminary results 2014]. Zecurion Analytics. 2015 g. - Rezhim dostupa: http://www.zecurion.ru/upload/iblock/fe3/ Zecurion_Data_leaks_2015.pdf. – (data obrashcheniya: 16.03.2015).
3. Globalnoe issledovanie utechek konfidentsialnoy informatsii v 2014 godu. Analiticheskiy centr InfoWatch 2015 g. [Global survey of confidential data leakage in 2014]. - Rezhim dostupa:http://www.infowatch.ru/sites/default/files/report/analytics/russ/InfoWatch_global_report_2014.pdf. –  (data obrashcheniya: 20.03.2015).
4. Bryukhomitskiy Y.A., Kazarin M.N. Uchebno-metodicheskoe posobie k ciklu laboratornykh rabot “Issledovanie biometricheskikh sistem dinamicheskoy autentifikatsii polzovateley PK po rukopisnomu i klaviaturnomu pocherkam po kursu: “Zashchita informatsionnykh protsessov v kompyuternykh sistemakh” [Study guide to the cycle of laboratory works “Investigation of dynamic biometric authentication systems of  PC users using handwriting and keyboarding” on the course: “Protection of information processes in computer systems”.].- Taganrog: Izd-vo TRTU, 2004. - 38s.
5. Ivanov A.I. Biometricheskaya identifikatsiya lichnosti po dinamike podsoznatelnykh dvizheniy [Biometric identification of individuals on the dynamics of unconscious movements]. – Penza: Izd-vo Penz. gos. un-ta, 2000. – 188 s.
6. Lozhnikov P.S., Sulavko A.E. Tekhnologiya identifikatsii polzovateley kompyuternykh sistem po dinamike podsoznatelnykh dvizheniy [Identification technology of the computer systems users on the grounds of subconscious movement dynamics]// Avtomatizatsiya i sovremennye tekhnologii/ Mashinostroenie – Moskva: 2015, №5,                 S. 31-36.
7. Epifantsev B.N., Lozhnikov P.S., Sulavko A.E., Borisov R.V. Kompleksirovannaya sistema identifikatsii lichnosti po dinamike podsoznatelnykh dvizheniy [Complex System of Identification of the Person by Dynamics of Subconscious Movements] // Bezopasnost informatsionnykh tekhnologiy / FGUP “VIMI” – Moskva: 2011, №4, S. 97-102.
8. Raskin D. Interfeys: novye napravleniya v proektirovanii kompyuternykh system [Human Interface: The New Directions for Designing Interactive Systems].- SPb: Simvol-plyus, 2010. - 272 s.
9. Sulavko A.E., Eremenko A.V., Samotuga A.E. Isklyuchenie iskazhennykh biometricheskikh dannykh iz ehtalona subekta v sistemakh identifikatsii [Exceptions gross mistakes of biometric data before creating measurement standards of people in biometric identification systems] // Informatsionnye tekhnologii i vychislitelnye sistemy/ LENAND – Moskva: 2013, №3. S. 96-101.
10. Dodis, Y., Reyzin, L., Smith, A. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data // Proceedings from Advances in Cryptology. EuroCrypt. – 2004. – P. 79-100.
11. Robert H Morelos-Zaragoza. The art of error correcting coding. John Wiley & Sons, 2006. — 320 p.
12. Soloveva F.I. Vvedenie v teoriyu kodirovaniya. Uchebnoe posobie [Introduction into theory of coding] / Novosib. gos. un-t. Novosibirsk, 2006, 127 s.
13. Eremenko A.V., Sulavko A.E. Issledovanie algoritma generatsii kriptograficheskikh klyuchey iz biometricheskoy informatsii polzovateley kompyuternykh system [Analysis of Algorithms for Cryptography KeyGeneration Based on User-SpecificBiometric Information of Computer Systems Users] // Informatsionnye tekhnologii/ “Novye tekhnologii” – Moskva: 2013, № 11, S. 47-51.
14. Ivanov A.I., Somkin S.A., Andreev D.Y., Malygina E.A. O mnogoobrazii metric, pozvolyayushchikh nablyudat realnye statistiki raspredeleniya biometricheskikh dannykh “nechetkikh ehkstraktorov” pri ikh zashchite nalozheniem gammy [Diversity metrics to watch actual biometric data distribution statistics «fuzzy extractors» in their protection of a range] // “Vestnik Uralskogo federalnogo okruga. Bezopasnost v informatsionnoy sfere”. 2014. № 2(12). S. 16-23.
15. Scotti, F., Cimato, S., Gamassi, M., Piuri, V., Sassi, R. Privacy-aware Biometrics: Design and Implementation of a Multimodal Verification System // 2008 Annual Computer Security Applications Conference, IEEE. – 2008. – P.  130-139.
16. Lozhnikov P.S., Sulavko, A.E., Volkov D.A. Application of noise tolerant code to biometric data to verify the authenticity of transmitting information / Control and Communications (SIBCON), 21-23 May 2015, Omsk, Russia – p.1-3. ISBN 978-1-4799-7102-2, DOI: 10.1109/SIBCON.2015.7147126.
17. Eremenko A. V., Sulavko A. E. Sposob dvukhfaktornoy autentifikatsii polzovateley kompyuternykh sistem na udalennom servere s ispolzovaniem klaviaturnogo pocherka [A method of two-factor authentication of computer systems users on a remote server using the keyboarding] // Prikladnaya informatika / NOU VPO “MFPU “Sinergiya”, Moskva 2015, № 6.
18. Tsoukalas L. H. Fuzzy and Neural Approaches in Engineering / L. H. Tsoukalas, R. E. Uhrig. – New York: John Wiley&Sons.Inc, 1997. – 587 p.
19. Kruglov V. V., Nechetkaia logika i iskusstvennye neironnye seti [Fuzzy Logic and Artificial Neural Networks]. V.V. Kruglov, M. I. Dli, R. Lu. Golunov. – M: Fizmatlit, 2001. – 224 s.
20. Sulvko A.E., Eremenko A.V. Metod szhatiya sobstvennykh oblastey klassov obrazov v prostranstve maloinformativnykh priznakov [Compression method of own areas of identified classes of images in the space
of signs that contains small portions of information] // Iskusstvennyy intellekt i prinyatie resheniy / LENAND – Moskva: 2014, №  2, S. 102-109.
21. Harin E.A. Design and construction of biometric authentication using the key sequence generator based on fuzzy data [Postroenie sistem biometricheskoj autentifikacii s ispol'zovaniem generatora kljuchevyh posledovatel'nostej na osnove nechetkih dannyh] / E.A. Harin, S.M. Goncharov, P.N. Kornjushin // Mater. 50-th Vseros. mezhvuz. nauch.-tehn. konf. – Vladivostok: TOVMI, 2007. – P. 112–115.
22. F. Monrose, M. K. Reiter and R. Wetzel. Password hardening based on keystroke dynamics. //Proceedings of sixth ACM Conference on Computer and Communications Security. — CCCS, 1999.

2017 / 01
2016 / 04
2016 / 03
2016 / 02

© ФИЦ ИУ РАН 2008-2016. Создание сайта "РосИнтернет технологии".