Fingerprint encryption for mobile SSDS
2019-12-12

With the rapid development of network technology and informatization, people pay more and more attention to the security of personal information and account. In the existing encryption technology, biometric identification and password identification are usually adopted.

Fingerprint encryption for mobile SSDS

Among them, the use of the individual user, which can identify the biological characteristics of methods, such as fingerprint, face, iris, because have lifelong invariance, almost become the pronoun of biometrics, in today's highly developed electronic information equipment, fingerprint encryption has been widely used in mobile phone to unlock, electronic payment, file security, information security, access control, attendance management and CARDS and other kinds of need computer automatically the identity authentication of the occasion.

Fingerprint encryption for mobile SSDS

However, as fingerprint encryption gradually becomes the mainstream decryption method, the security of fingerprint encryption still faces great challenges. For example, when users use fingerprints, they will leave fingerprints on the fingerprint collection head, and these fingerprints have the possibility of being used to duplicate fingerprints. For example, criminals steal users' fingerprints to carry out illegal activities when users are unconscious.

However, the identification is carried out by using the code words set by individuals, such as the set text, the set discourse, the set character order, the set time interval, etc. Before the development of biometrics recognition technology, the identification methods mostly belong to the set code recognition.

The advantage of this identification method is that the code sign belongs to the individual's inner consciousness, which is not easy to be stolen.Therefore, it is necessary to improve the existing encryption technology to overcome the shortcomings of the existing technology.

  1. Symmetric encryption

    Using the method of single key cryptography system, the same key as the encryption and decryption tool, through the key control encryption and decryption instructions, the algorithm specifies how to encrypt and decrypt. The advantages are algorithm public, encryption and decryption speed, high efficiency, the disadvantage is to send before the two sides to maintain a unified key, if the leakage is not safe, usually by AES, DES encryption algorithm;

    2. Asymmetric encryption


    Asymmetric encryption algorithm need two keys for encryption and decryption, the two secret key is public key (hereinafter referred to as a public key and private key (referred to as 'private key'), if one party is encrypted with the public key, private key to decrypt receiver application, whereas the sender with the private key to encrypt and decrypt the receiver with the public key, as a result of the use of encryption and decryption is not the same key, is called asymmetric encryption algorithm; Compared with symmetric encryption algorithm, asymmetric encryption is much more secure, but much less efficient, because it takes longer to decrypt the encryption, so it is suitable for less data encryption, usually RSA,ECC encryption algorithm and so on 2019-12-11

Recommend