A Study of User Authentication and Cryptographic key Generation Based on Keystroke Dynamics

碩士 === 國立成功大學 === 資訊工程學系碩博士班 === 91 === The biometrics is to make use of in each living creature individual, can represent that individual, and make use of the not same characteristic in other individual. Reach the function that recognize. Such as fingerprint, iris, sound… etc. And in the computer s...

Full description

Bibliographic Details
Main Authors: Hung-Yu Su, 蘇弘毓
Other Authors: Hung-Min Sun
Format: Others
Language:zh-TW
Published: 2003
Online Access:http://ndltd.ncl.edu.tw/handle/85880660164600500011
Description
Summary:碩士 === 國立成功大學 === 資訊工程學系碩博士班 === 91 === The biometrics is to make use of in each living creature individual, can represent that individual, and make use of the not same characteristic in other individual. Reach the function that recognize. Such as fingerprint, iris, sound… etc. And in the computer systems, distinguish the user’s different, only have depend on whether ID and passwords form couples or not to decide. With time passed, intruders also develop lots of way or guessing passwords, to get data or personal privacy originally store in system. Enhancing the password systems. It also with the user''s keystroke dynamics at many researches Proved the user''s keystroke is a repeatable occurrence. And adding user''s keystroke dynamics in password system can use the minimum cost to get the biggest benefit. Besides, in addition to user recognizing, we make use of keystroke dynamics and its property of repeatable to record private key of the user. Only the user input his ID and password, system can restore the key that is not stored in the systems. Then provided for other uses, such as using the public key systems, signature ... etc.