Combinando Criptografia e Biometria: Sistemas de Regeneração de Chave
Danielle Paes B. de A. Camara1 & Valdemar C. da Rocha Jr.1
Resumo: Este artigo apresenta uma abordagem tutorial sobre soluções de segurança através do uso combinado de técnicas biométricas e criptográﬁcas, com ênfase dada à solução denominada Regeneração de Chave, a qual envolve o uso de técnicas de correção de erro.
Palavras-chave: Biometria, multibiometria, criptograﬁa, códigos corretores de erro, segurança
 B. Schneier, Applied Cryptography Second Edition: Protocols, Algorithms and Source in C, Wiley Publishing, Inc., 1996.
 W. Mao, Modern Cryptography - Theory & Practice, Prentice Hall PTR, 2004.
 “Advanced Encryption Standard (AES),” Federal Information Processing Standards Publication 197, National Institute of Standards and Technology, November 2001, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.
 N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, “Generating Cancelable Fingerprint Templates,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 561-572, April 2007.
 T. E. Boult, W. J. Scheirer, and R. Woodworth, “Revocable Fingerprint Biotokens: Accuracy and Security Analysis,” IEEE Conference on Computer Vision and Pattern Recognition, pp. 1-8, Minneapolis, Minnesota, USA, June 2007.
 M. Savvides, B. V. Kumar and P. Khosla, “Cancelable Biometric Filters for Face Recognition,” Proceedings of the 17th International Conference on Pattern Recognition (ICPR04), vol. 3, pp. 922-925, Cambridge, UK, August 2004.
 Y. Dodis, L. Reyzin, and A. Smith, “Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data,” Proceedings of the Eurocrypt 2004, pp. 523-540, Interlaken, Switzerland, May 2004.
 F. Monrose, M.K. Reiter, and R. Wetzel, “Password Hardening Based on Keystroke Dynamics,” Proceedings of the Sixth ACM Conference on Computer and Communication Security (CCCS), pp. 73-82, Singapore, November 1999.
 F. Monrose, M.K. Reiter, Qi Li, and S. Wetzel, “Cryptographic Key Generation from Voice,” Proceedings of the IEEE Symposium on Security and Privacy, pp. 202-213, Oakland, California, USA, May 2001.
 A. Goh and D. C. L. Ngo, “Computation of Cryptographic Keys from Face Biometrics,” Proceedings of the International Federation for Information Processing 2003, pp. 1-13, 2003.
 Y. Chang, W. Zhung, and T. Chen, “Biometrics-based Cryptographic Key Generation,” IEEE International Conference on Multimedia and Expo (ICME), vol. 3, pp. 2203-2206, Taipei, Taiwan, June 2004.
 C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and B. V. K. Vijaya Kumar, “Biometric Encryption,” ICSA Guide to Cryptography, McGraw-Hill, 1999. http://www.bioscrypt.com/assets/documents/whitepapers/Biometric_Encryption.pdf.
 T. C. Clancy, N. Kiyavash, and D. J. Lin, “Secure Smartcard-based Fingerprint Authentication,” Proceeding of ACM SIGMM Workshop on Biometrics Methods and Applications, pp. 45-52, Berkeley, CA, USA, November 2003.
 J. Bringer, H. Chabanne, G. Cohen, B. Kindarji and G. Zmor, “Theoretical and Practical Boundaries of Binary Secure Sketches,” IEEE Transactions on Information Forensics and Security, Vol. 3, No. 4, pp. 673-683, December 2008.
 S. Kanade, D. P. B. A. Camara, E. Krichen, D. Petrovska-Delacrétaz, B. Dorizzi, “Three Factor Scheme for Biometric-based Cryptographic Key Regeneration Using Iris,” The 6th Biometrics Symposium 2008 (BSYM2008), pp. 59-64, Tampa, Florida, USA, September 2008.
 S. Kanade, D. P. B. A. Camara, D. Petrovska-Delacrétaz, B. Dorizzi, “Application of Biometrics to Obtain High Entropy Cryptographic Keys,” Proceedings of World Academy of Science, Engineering and Technology, Vol. 27, pp. 251 - 255, Hong Kong, China, March 2009. http://www.waset.org/journals/waset/v27/v27-43.pdf
 D. P. B. A. Camara, J. Lemos Neto and V. C. da Rocha Jr., “Multiinstance Based Cryptographic Key Regeneration System,” SBrT2012 - Simpósio Brasileiro de Telecomunicações, Brasília, DF, 2012.
 K. Nandakumar and A. K. Jain,“Multibiometric Template Security Using Fuzzy Vault,” IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems, Washington DC, USA, 2009.
 F. J. MacWilliams and N. J. A. Sloane, The Theory of Error-Correcting Codes, North Holland, 1988.
 S. Lin, D. J. Costello, Error Control Coding (2nd Edition), Prentice Hall, 2004.
 International Standards for Business, Government and Society - ISO/IEC JTC 1 /SC 37 Biometrics http://www.iso.org/iso/jtc1_sc37_home (acessado em 10 de junho de 2012).
 A. K. Jain, A. Ross and S. Prabhakar, “An Introduction to Biometric Recognition,” IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image and Video Based Biometrics, Vol. 14, No. 1, January 2004.
 R. Viveros, K. Balasubramanian, N. Balakrishnan, “Binomial and Negative Binomial Analogues Under Correlated Bernoulli Trials,” The American Statistician, Vol. 48, Issue 3, pp. 243-247, 1994.
 “An Introduction to Information Security,” A Certicom White Paper, 1997. http://www.certicom.com