Extended Access Control on electronic passport with the aim of overcoming limited computing resources

Document Type : Original Article


1 Department of Computer-Software Engineering, Faculty of Engineering, Islamic Azad University, South Tehran Branch, Tehran, IRAN

2 Assistant Professor, Department of Software Engineering, Software Engineering, Faculty of Engineering, South Tehran Branch, Islamic Azad University, Tehran, Iran


In this project, Extended Access Control on the electronic passport was designed to overcome limited computing resources. Today, experts are looking for safer ways to identify and authenticate authenticity. One of the most successful of these ways is the use of biometrics. In this project, in order to reduce the volume of computing, the Fast Exponential method has also been added to Diffie- Hellman, as well as to enhance the security of the proposed research protocol and reduce the success rate of attacks such as a man-in-the-middle attack to steal information, from fingerprint to extract some of the required parameters of the Diffie-Hellman method (parameters q and g) is used. To this end, three different scenarios were raised. The results of the simulation showed that the proposed method reduces the computational load of the classical Diffie-Hellman method and, therefore, reduces the run-time. Also, the results showed that the first scenario is better than the other two scenarios in terms of both runtime and computational load.


Jain, A. K., Ross, A., & Pankanti, S. (2006). Biometrics: a tool for information security. IEEE transactions on information forensics and security, 1(2), 125-143.
Jain, A. K., Ross, A. A., & Nandakumar, K. (2011). Introduction to biometrics. Springer Science & Business Media.
Sinha, A. (2011). A survey of system security in contactless electronic passports. Journal of Computer Security, 19(1), 203-226.
Dagdelen, Ö., & Fischlin, M. (2010, October). Security analysis of the extended access control protocol for machine readable travel documents. In International Conference on Information Security (pp. 54-68). Springer, Berlin, Heidelberg.
Buchmann, N., Peeters, R., Baier, H., & Pashalidis, A. (2013, September). Security considerations on extending PACE to a biometric-based connection establishment. In 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG) (pp. 1-13). IEEE.
Calderoni, L., & Maio, D. (2014). Cloning and tampering threats in e-Passports. Expert systems with applications, 41(11), 5066-5070.
entrust.com.usa:news,entrust epassport technology new standard for danish eac migration.
Victory, n. (2009), "Integrated System Design for Radio Frequency Identification (RFID) Based Identification and Biometric Indicators in E-Commerce Interactions", Master's thesis, Shiraz University, Shiraz.
Abbasinezhad-Mood, D., Nikooghadam, M., Mazinani, S. M., Babamohammadi, A., & Ostad-Sharif, A. (2019). More efficient key establishment protocol for smart grid communications: design and experimental evaluation on ARM-based hardware. Ad Hoc Networks.
Rescorla, E. (1999). Diffie-hellman key agreement method (No. RFC 2631).
Law, L., Menezes, A., Qu, M., Solinas, J., & Vanstone, S. (2003). An efficient protocol for authenticated key agreement. Designs, Codes and Cryptography, 28(2), 119-134.
Tsaban, B. (2006). Fast generators for the Diffie–Hellman key agreement protocol and malicious standards. Information processing letters, 99(4), 145-148.