Transactions on Machine Intelligence

Transactions on Machine Intelligence

Extended Access Control on electronic passport with the aim of overcoming limited computing resources

Document Type : Original Article

Authors
1 Department of Computer-Software Engineering, Faculty of Engineering, Islamic Azad University, South Tehran Branch, Tehran, IRAN
2 Assistant Professor, Department of Software Engineering, Software Engineering, Faculty of Engineering, South Tehran Branch, Islamic Azad University, Tehran, Iran
Abstract
In this project, Extended Access Control on the electronic passport was designed to overcome limited computing resources. Today, experts are looking for safer ways to identify and authenticate authenticity. One of the most successful of these ways is the use of biometrics. In this project, in order to reduce the volume of computing, the Fast Exponential method has also been added to Diffie- Hellman, as well as to enhance the security of the proposed research protocol and reduce the success rate of attacks such as a man-in-the-middle attack to steal information, from fingerprint to extract some of the required parameters of the Diffie-Hellman method (parameters q and g) is used. To this end, three different scenarios were raised. The results of the simulation showed that the proposed method reduces the computational load of the classical Diffie-Hellman method and, therefore, reduces the run-time. Also, the results showed that the first scenario is better than the other two scenarios in terms of both runtime and computational load.
Keywords

  • [1] Jain, A. K., Ross, A., & Pankanti, S. (2006). Biometrics: A tool for information security. IEEE Transactions on Information Forensics and Security, 1(2), 125–143. https://doi.org/10.1109/TIFS.2006.873653
  • [2] Jain, A. K., Ross, A. A., & Nandakumar, K. (2011). Introduction to biometrics. Springer. https://doi.org/10.1007/978-0-387-77326-1
  • [3] Sinha, A. (2011). A survey of system security in contactless electronic passports. Journal of Computer Security, 19(1), 203–226. https://doi.org/10.3233/JCS-2010-0414
  • [4] Dagdelen, Ö., & Fischlin, M. (2010, October). Security analysis of the extended access control protocol for machine readable travel documents. In International Conference on Information Security (pp. 54–68). Springer. https://doi.org/10.1007/978-3-642-18178-8_6
  • [5] Buchmann, N., Peeters, R., Baier, H., & Pashalidis, A. (2013, September). Security considerations on extending PACE to a biometric-based connection establishment. In 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG) (pp. 1–13). IEEE.
  • [6] Calderoni, L., & Maio, D. (2014). Cloning and tampering threats in e-passports. Expert Systems with Applications, 41(11), 5066–5070. https://doi.org/10.1016/j.eswa.2014.02.044
  • [7] Mbithi, M. (2010). East African Community (EAC) Protocol on Common Market: implications for Kenya Private Sector in Kenya.
  • [8] Victory, N. (2009). Integrated system design for radio frequency identification (RFID) based identification and biometric indicators in e-commerce interactions [Master’s thesis, Shiraz University].
  • [9] Abbasinezhad-Mood, D., Nikooghadam, M., Mazinani, S. M., Babamohammadi, A., & Ostad-Sharif, A. (2019). More efficient key establishment protocol for smart grid communications: Design and experimental evaluation on ARM-based hardware. Ad Hoc Networks, 88, 194–202. https://doi.org/10.1016/j.adhoc.2019.03.005
  • Cervantes-Vázquez, D., Ochoa-Jiménez, E., & Rodríguez-Henríquez, F. (2021). Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH. IET Information Security, 15(5), 364–374. https://doi.org/10.1049/ise2.12027
  • Rescorla, E. (1999). Diffie–Hellman key agreement method (RFC 2631). Internet Engineering Task Force. https://doi.org/10.17487/rfc2631
  • Law, L., Menezes, A., Qu, M., Solinas, J., & Vanstone, S. (2003). An efficient protocol for authenticated key agreement. Designs, Codes and Cryptography, 28(2), 119–134. https://doi.org/10.1023/A:1022595222606
  • Tsaban, B. (2006). Fast generators for the Diffie–Hellman key agreement protocol and malicious standards. Information Processing Letters, 99(4), 145–148. https://doi.org/10.1016/j.ipl.2005.11.025
Volume 4, Issue 1
Winter 2021
Pages 21-28

  • Receive Date 20 December 2020
  • Revise Date 14 January 2021
  • Accept Date 11 March 2021