Using Voice to Generate Cryptographic Keys (original) (raw)

Cryptographic Key Generation from Voice (Extended Abstract)

IEEE Symposium on Security and Privacy, 2001

We propose a technique to reliably generate a crypto- graphic key from a user's voice while speaking a password. The key resists cryptanalysis even against an attacker who captures all system information related to generating or verifying the cryptographic key. Moreover, the technique is sufficiently robust to enable the user to reliably regener- ate the key by uttering her password

Toward speech-generated cryptographic keys on resource constrained devices

Proceedings of the …, 2002

Шжг ж бб а бг а д гв з в д жзгв а и а зз зи виз ДШ зЕ л и б жгд гв з д жб и кг Й ж к в йз ж ви ж з в л йз ж джгк з вЙ дйи н зд в К Св и з д д жИ л з гл гл иг мЙ даг и и з д а ин иг в ж и жндиг ж д нз гв зй к зК Ыд Ќ аанИ л и а гйж бЙ да б ви и гв г и в ей иг в ж и ж д иЙ а жндиг ж д ...

Cryptographic Approach Using Audio for Data Security

Citation/Export MLA Anuja Phapale, “Cryptographic Approach Using Audio for Data Security”, February 15 Volume 3 Issue 2 , International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), ISSN: 2321-8169, PP: 825 - 827, DOI: 10.17762/ijritcc2321-8169.150285 APA Anuja Phapale, February 15 Volume 3 Issue 2, “Cryptographic Approach Using Audio for Data Security”, International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), ISSN: 2321-8169, PP: 825 - 827, DOI: 10.17762/ijritcc2321-8169.150285

XXX-X-XXXX-XXXX-X/XX/$XX.00 ©20XX IEEE Enhancing Cyber Security Using Audio Techniques: A Public Key Infrastructure for Sound

This paper details the research into using audio signal processing methods to provide authentication and identification services for the purpose of enhancing cyber security in voice applications. Audio is a growing domain for cyber security technology. It is envisaged that over the next decade, the primary interface for issuing commands to consumer internet-enabled devices will be voice. Increasingly, devices such as desktop computers, smart speakers, cars, TV's, phones and Internet of Things (IOT) devices all have built in voice assistants and voice activated features. This research outlines an approach to securely identify and authenticate users of audio and voice operated systems that utilises audio steganography in a method comparable to a PKI for sound and existing cryptography methods whilst retaining the usability associated with audio and voice driven systems.

Loud and clear: Human-verifiable authentication based on audio

2006

Secure pairing of electronic devices that lack any previous association is a challenging problem which has been considered in many contexts and in various flavors. In this paper, we investigate the use of the audio channel for human-assisted authentication of previously un-associated devices. We develop and evaluate a system we call Loud-and-Clear (L&C) which places very little demand on the human user. L&C involves the use of a text-to-speech (TTS) engine for vocalizing a robust-sounding and syntactically-correct (English-like) sentence derived from the hash of a device's public key. By coupling vocalization on one device with the display of the same information on another device, we demonstrate that L&C is suitable for secure device pairing (e.g., key exchange) and similar tasks. We also describe several common use cases, provide some performance data for our prototype implementation and discuss the security properties of L&C.

Your Password Is Music To My Ears: Cloud Based Authentication Using Sound

CONFLUENCE2021, 2021

This paper details the research in progress into identifying and addressing the threats faced by voice assistants and audio based digital systems. The popularity of these systems continues to grow as does the number of applications and scenarios they are used in. Smart speakers, smart home devices, mobile phones, telephone banking and even vehicle controls all benefit from being able to be controlled to some extend by voice without diverting the attention of the user to a screen or having to use an input device such as a screen or keyboard. Whilst this removes barriers to use for those with accessibility challenges like visual impairment or motor skills issues and opens up a much more convenient user experience, a number of cyber security threats remain unanswered. This paper details a threat modelling exercise and suggests a model to address the key threats whilst retaining the usability associated with voice driven systems, by using an additional sound based authentication factor.

Bio-metric Encryption of Data Using Voice Recognition

Automation, Control and Intelligent Systems, 2021

In symmetric cryptosystems, the protection of secret keys is based on the traditional user authentication and likewise the security of the cryptosystem depends on the secrecy of the secret keys. In the event of lost, theft or infection of these secrete keys; the security of the cryptosystems would be compromised hence exposing critical information. Biometrics has been commercially used to verify user's identity. Voice biometrics has been proven to be even more effective because it cannot be stolen in some cases like face, fingerprint or even iris biometrics. The research proves that a well-designed system will prompt an authentication question and on verification user must provide both the desired answer as well as desired matching threshold or the system ignores the user features. This research proposes a software-based architecture solution for Biometric Encryption of data using Voice Recognition that employed the Dynamic Time Warping (DTW) technique to solve the problem of speech biometric duration varying with non-linear expansion and contraction. The approach then used database to store the monolithically bind cryptographic key with the equivalent biometric hardened template of the user in such manner that identity of the key will stay hidden unless there is a successful biometric authentication by intended party. The research used the MIT mobile device speaker verification corpus (MDB) and A data set in quiet environment (QDB) for training and verifying session. Finally using the Equal Error Rate (EER) the research evaluated performance or rate at which False Acceptance Rate (FAR) and a False Rejection Rate (FRR) are equal. Therefore, according to the result it offers a better substitute method of user authentication than traditional pre-shared keys for benefit of protecting secret keys.

Enhancing Cyber Security Using Audio Techniques: A Public Key Infrastructure for Sound

IEEE TrustCom, 2021

This paper details the research into using audio signal processing methods to provide authentication and identification services for the purpose of enhancing cyber security in voice applications. Audio is a growing domain for cyber security technology. It is envisaged that over the next decade, the primary interface for issuing commands to consumer internet-enabled devices will be voice. Increasingly, devices such as desktop computers, smart speakers, cars, TV's, phones an Internet of Things (IOT) devices all have built in voice assistants and voice activated features. This research outlines an approach to securely identify and authenticate users of audio and voice operated systems that utilises existing cryptography methods and audio steganography in a method comparable to a PKI for sound, whilst retaining the usability associated with audio and voice driven systems.