Fighting Coercion Attacks in Key Generation using Skin Conductance

نویسندگان

  • Payas Gupta
  • Debin Gao
چکیده

Many techniques have been proposed to generate keys including text passwords, graphical passwords, biometric data and etc. Most of these techniques are not resistant to coercion attacks in which the user is forcefully asked by an attacker to generate the key to gain access to the system or to decrypt the encrypted file. We present a novel approach in generating cryptographic keys to fight against coercion attacks. Our novel technique incorporates the user’s emotional status, which changes when the user is under coercion, into the key generation through measurements of the user’s skin conductance. We present a model that generates cryptographic keys with one’s voice and skin conductance. In order to explore more, a preliminary user study with 39 subjects was done which shows that our approach has moderate falsepositive and false-negative rates. We also present the attacker’s strategy in guessing the cryptographic keys, and show that the resulting change in the password space under such attacks is small.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bi-Deniable Public-Key Encryption

In CRYPTO 1997, Canetti et al.put forward the intruiging notion of deniable encryption, which (informally) allows a sender and/or receiver, having already performed some encrypted communication, to produce ‘fake’ (but legitimate-looking) random coins that open the ciphertext to another message. Deniability is a powerful notion for both practice and theory: apart from its inherent utility for re...

متن کامل

بررسی هدایت الکتریکی پوست (SCL) در مبتلایان به دمانس

Background:Today world faces the crisis of aging population. Dementia can be considered as one of the most important diseases of elderly .psychophysiological researches about dementia can attract our attentions us to more objective findings. Changes in baseline skin conductance in patients suffering from Schizophrenia were revealed in previous studies. Regarding common neurodegenerative base be...

متن کامل

Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks

Cryptographic systems often rely on the secrecy of cryptographic keys given to users. Many schemes, however, cannot resist coercion attacks where the user is forcibly asked by an attacker to reveal the key. These attacks, known as rubber hose cryptanalysis, are often the easiest way to defeat cryptography. We present a defense against coercion attacks using the concept of implicit learning from...

متن کامل

Male Armaments and Reproductive Behavior in “Nutcracker” Camel Crickets (Rhaphidophoridae, Pristoceuthophilus)

Males of many species possess striking weaponry used in intrasexual competition for access to females. Until recently, there were no known cases of male weaponry being used against females in sexual coercion. However, in the camel cricket, Pristoceuthophilus marmoratus, males use modified hind legs to fight with each other and also to trap females and force them to copulate. To determine whethe...

متن کامل

Bingo Voting: Secure and Coercion-Free Voting Using a Trusted Random Number Generator

It is debatable if current direct-recording electronic voting machines can sufficiently be trusted for a use in elections. Reports about malfunctions and possible ways of manipulation abound. Voting schemes have to fulfill seemingly contradictory requirements: On one hand the election process should be verifiable to prevent electoral fraud and on the other hand each vote should be deniable to a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010