Abstract Mobile handheld device is a popular device that provides secure, private, authentic, and accurate communication and exchange of confidential information. In this paper we propose a technique to solve the authenticity problem in mobile communication. This technique is mainly based on the usage of the Fingerprint to identify both the speaker and the sender. This technique is simple, requires less calculation than other public/private key techniques, assures more authenticity than digital signature, and eliminates the need for a third party. Moreover, when applied to mobile phones, this technique resists any forge imposed by another party. Keywords: Cryptography, Secure Telecommunication, Fingerprint Recognition. 1. Introduction A recent survey carried by Interactive Statistics Corporation (IDC) shows that around 90% of mobile users use messaging as their main communication tool disregarding the safety level of such a communication system; if phones are lost or shared, anyone can access the data on the phone. This is known as the AUTHENTICITY in cryptography science. That is why, scientists should come up with a concept that minimizes the risk associated with losing or sharing a phone, thus offering a safe environment for communication. This paper presents a solution for the above mentioned problem. “Fingerprint Identification Technique” is the most effective technique for solving such a problem. This technique works on the Fingerprint basis whereby the phone can be accessed when it identifies the Fingerprint of the user(s). This paper is organized as follows: In section 2, we provide an overview of the secure communication in mobile handheld device. Then, section 3 describes the digital signature scheme and the related algorithm RSA [3]. In section 4, we write the code of the RSA algorithm in JAVA for the performance purpose. Section 5 gives a literature review of fingerprint matching technique. Next in section 6, we describe the proposed design which is based on the fingerprint to authenticate the caller, the performance of our design is given in section 7 and finally section 8 concludes the paper with future work.
[1]
Sharath Pankanti,et al.
Filterbank-based fingerprint matching
,
2000,
IEEE Trans. Image Process..
[2]
Gene Tsudik,et al.
Experimenting with Server-Aided Signatures
,
2002,
NDSS.
[3]
William Stallings,et al.
Cryptography and Network Security: Principles and Practice
,
1998
.
[4]
Stefano Bistarelli,et al.
An Asymmetric Fingerprint Matching Algorithm for Java Card™
,
2005,
AVBPA.
[5]
Anil K. Jain,et al.
Handbook of Fingerprint Recognition
,
2005,
Springer Professional Computing.
[6]
Adi Shamir,et al.
A method for obtaining digital signatures and public-key cryptosystems
,
1978,
CACM.
[7]
Stefano Bistarelli,et al.
Computer Algebra for Fingerprint Matching
,
2003,
International Conference on Computational Science.
[8]
J. Huisman.
The Netherlands
,
1996,
The Lancet.
[9]
Takahiro Hatano,et al.
A fingerprint verification algorithm using the differential matching rate
,
2002,
Object recognition supported by user interaction for service robots.
[10]
Gene Tsudik,et al.
Server-Supported Signatures
,
1996,
ESORICS.