Sunteți pe pagina 1din 5

2017 International Electronics Symposium on Engineering Technology and Applications (IES-ETA)

Digital Signature On File Using Biometric


Fingerprint With Fingerprint Sensor On
Smartphone
Erika Rahmawati, Mariska Listyasari, Adam Shidqul Aziz, Sritrusta Sukaridhoto, Fardani Annisa Damastuti,
Mochamad Mobed Bachtiar, Amang Sudarsono

Departement of Multimedia Creative, Electronic Engineering Polytechnic Institute of Surabaya, Surabaya, Indonesia
erikarahmawatiaziz@gmail.com, kakamariska@gmail.com, aziz.addam@gmail.com, dhoto@pens.ac.id,
fardani@pens.ac.id, mochamadmobed@gmail.com, amang@pens.ac.id

Abstract—Digital signature is a term that use a key pair of Using biometric technology, people can doing
user for sign and verify a document. People can create their authentication with simply process. People no need to remind
digital signature using biometric technology. Biometric word or number when they want to verify them self digitally.
technology is a concept that allows people to doing an digitally One of biometric technology in demand is fingerprint.
authentication using their bodies, for example by using their Biometric fingerprint has now been applied in security system
fingerprint. Now, fingerprint biometric technology system was access, such as is for access to the door. Even,
available in some smartphone product, so that allows user to now smartphone technology also use
unlocking their smartphone only by scanning their fingerprint fingerprint authentication system for unlocking the device. It’s
into smartphone’s fingerprint sensor. The combination of that’s
allows people to unlocking their smartphone only by scanning
all technology (digital signature, biometric fingerprint,
smartphone with fingerprint sensor) can arise an innovation to
their fingerprint into their smartphone fingerprint sensor. In this
make a system that can create a digital signature only using paper, we will explain about the integrated system between
fingerprint on smartphone. This system applied to a method of fingerprint technology and fingerprint sensor technology
signing document digitally. When user sending a document to on smartphone that would be applied in the digital signature
other, user who send the document have to put their fingerprint concept. The goal of this paper is to develop a system that
into smartphone fingerprint sensor and the the document will be allows people to digitally sign document safely by simply
encrypted. Then, user who receive the encrypted message will scanning their fingerprint into their smartphone’s fingerprint
decrypt the message using public key of user who as a sender. In sensor.
this case, fingerprint is a medium to call the value of user private
key from the database. Key pair algorithm for this system is II. ADOPTED ALGORITHM
using RSA algorithm.
A. Biometric Fingerprint
Keywords— Digital Signature, Biometric Fingerprint,
Ecryption-Decryption. Biometric fingerprint is a personal authentication technique
based on their polar fingerprint. Fingerprint authentication
I. INTRODUCTION techniques have a little possibility to being attacked by
someone who did not have an access to the privacy. This
In the digital era, people’s digital authentication system is technique was safe and cannot be attacked by others because
something familiar. Digital authentication of a person has everyone has different fingerprint polar pattern though they are
been done using a password, token, or PIN. However, a twins. Fingerprint authentication allows people to verify them
self with simply process. People only need to put their
authenticating with that technique is not safe because it
fingerprint into fingerprint scanner when they want to
susceptible to stolen by others and allows people to get access
authenticate themselves. This technique assumed better than
to our privacy. Another technique to identifying people authentication technique such as password, PIN, or token that
digitally is using biometric technology. Biometric technology requires people to remember many word and counts.
analyze person through their unique feature such as their face,
eyes, fingerprint, and many more. Biometric technology also B. Digital Signature
sustain to doing person identifying according to their smell,
voice, signature, and the other person unique feature. The digital signature system uses a key pairs for signatures
and verification that called private key and public key. The key
Excellence system of biometric is this system allows people to
pairs have values that are different from each other. Signatures
authenticate them self securely because the data could not be
process on digital signature system using private key and
stolen, shared, duplicated, or lost [1]. verification process using public key. A key pairs that has
different value was referred to asymmetric key pairs [2]. Using

978-1-5386-0712-1/17/$31.00 ©2017 IEEE 234


this concept (digital signature concept), sending message The system overview of generating digital signature using
process assumed to be more secure because people who don’t fingerprint is explains on figure 1. In this case, there are 2
have an authority to access the message cannot doing sabotage. users. "User 1" acts as someone requiring a signature from
This three parth also was called as man in the middle (MITM) "user 2" and while, "user 2" acts as someone who signature the
[3]. document.
“User 1” asks the digital signature of “User 2” in a document,
C. RSA Algorithm
so “User 1” sends the document to “User 2”. Before the
Rivest, Shamir, Adleman (RSA) algorithm is widely used document is sent to "user2", the document will sent to the
as a security system on internet. RSA is algorithm on public server first to be stored in the database. Files stored in the
key encryption. RSA algorithm using a key with 1024 – 2048 database server will experience a name change to indicate that
bit, so it will difficult to hacked. RSA algorithm had the stored document is a document sent by "user 1". After
been combined with the other algorithm such as with Digital
changing the name and successfully saved, document will be
Signature Algorithm (DSA). When RSA combined with DSA,
sent to “user2”.
RSA algorithm can function as a system to decrypt data and
create a signature. The system of RSA algorithm is better that When “User 2” receives the document,
SHA system [4]. He can make two choices including approving and not
approving documents. If "user 2" approves the document, he
will use fingerprint for approval process. If, “User 2” approves
D. Advanced Encryption Standard (AES) the document, he scan his fingerprint into smartphone’s
AES is an algorithm which one of the functions is for fingerprint sensor, when smartphone doing authentication,
encryption and decryption [5]. AES is an algorithm for doing system will connect to server. Server will generate a pair of key
symmetric cryptography. That’s mean, AES can encrypt and using RSA algorithm, and then server will send the private key
decrypt file with single key. AES has 3 variants of key length, and public key to the database. Server will encrypt the
they are 128 bit, 192 bit, and 256 bit. But, data block length of document using private key. After document was encrypted,
AES was fixed became 128 bit. Every key length of AES has a “User 2” will forward the signing document to “User 1”
different iteration round. AES with 128 bit key length have 10 include with the public key. “User 1” that receives the
total several rounds, AES 192 bit key length have 12 total encrypted document and public key can check the owner of
several rounds, and 256 bit key-length have 14 total several signature and decrypt the document by access the server.
rounds [6].

III. PROPOSED SYSTEM OF FILE AUTHENTICATION BASED


ON BIOMETRIC FINGERPRINT AND DIGITAL SIGNATURE
Digital signature of this system generated using biometric
fingerprint. The data of biometric fingerprint will used to
authenticate the sender of document.

Fig. 2. Fingerprint validation process

According to figure 2, fingerprint data of user when user


doing signature process on application will be matched with
fingerprint data on smartphone storage. If fingerprint data
between application and smartphone storage is match,
validation process is success. After that, server is generating a
pair of key that was called public key and private key. The
private key from generating key process on server be used for
encryption process. Encryption process using 2 parameters,
they are file and private key. The output of encryption process
is an encrypted file.

IV. IMPLEMENTATION AND EXPERIMENT


In this section, the explaination of implementation system
and the result of experiment will be explain. There are 2 things
that we are doing both on implementation section and
Fig. 1. System overview experiment section, they are implementation of encryption and

235
decryption process and the implementation of generating Explainations :
digital signature using biometric fingerprint on smartphone. A : User A S : Signature
B : User B PkA : Public Key User A
M : Message SkA : Private Key User A
A. Encryption Decryption System on Server C : Chipertext PkB : Public Key User B
E : Encryption SkB : Private Key User B
D : Decryption T/F : True/False

Fig. 4. Asymmetric cryptography scheme

The symmetric key for doing encryption and decryption


generated by AES method, and the asymmetric key for
signature and verification generated using RSA algorithm. AES
is an algorithm which affecting the size of encrypted file. For
Explaination : this system, the key length of AES did used for encrypting file
A : User A C : Chipertext T/F : True/False is 256 bit. The key length of RSA which used for signature file
B : User B SkA : Private Key User A
is 2048 bit. The reason of using 2048 bit for signature is
M : Message D : Decryption
K : Key S : Signature because 2048 bit is the recomended key lenght for getting the
E : Encryption PkA : Public Key User A best security data level.
In the earlier research, a system for doing digital signature
Fig. 3. Symmetric cryptography scheme using biometric fingerprint was only described. For this paper,
we carried out the system and combine it with fingerprint
There are two ways to generate a digital signature, they are sensor on smartphone. This system had been develope with 2
symmetric cryptography and asymmetric cryptography. In elements that needed to ready. The first element is server
symmetric cryptography schemes, encryption and decryption system and the second one is application system. Server is the
processes using symmetric keys, signature and verification part which doing encryption and signature, system work of
processes using asymmetry key. The scheme for symmetric application is just calling the work system of server.
cryptography is explains on figure 3. Asymmetric cryptography
is a concept which use asymmetric key for encryption and
B. Generating Digital Signature Using Fingerprint on
decryption (public key for encryption and private key for
Smartphone
decryption) and asymmetric key for sign and verify (private
key for signature and public key for verification). The scheme Application for android platform can be developed using
for symmetric cryptography is explains on figure 4. For this android studio with the least of SDK is 23, for iOS,
system, we are use symmetric cryptography. application can be developed using cordova. This system
allows the fingerprint to call the PHP program functions on the
server to obtain the private key. This private key is the key for
encrypt the file. Fingerprint data could not be a private key for
encrypt file. That is because of the data of fingerprint id could
not to reach. Fingerprint id of user on smartphone is located on
the security system on both android and iOS. There for, for this
system, fingerprint had been develope to obtain the generate
key from PHP program on server. It can be assumed that
fingerprint is only the media for encrypting file. Encryption
and decryption a file was doing by server. This concept can
be assumed to be safe for digital signature because people who
(a) Encryption and Decryption Process can doing signature to the document only people who have a
fingerprint user on smartphone device. To check the owner of
private key, receiver can use the public key of sender and
check the owner private key with the public key.

C. Experiment of Digital Signature, and Encryption -


Decryption
According to explaination on section III, the process of
encryption decryption and digital signature was doing on server
side. This explain that, server is where the PHP program for
encryption decryption and digital signature was saved. Server
also is where the document and the data of user was saved id
(b) Signature Verification Process the database system. The specification of server that use for
this system is based on table 1 :

236
TABLE I. SERVER SPESIFICATION time for doing digital signature using fingerprint on
Device Spesification
smartphone is due to AES algorithm usage.

CPU Family 15 The result of implementation fingerprint authentication


system for encryption and decryption file and digital signature
CPU MHz 3092.838 using biometric fingerprint on smartphone are represented in
Chace size 4096 KB figure 5.
CPUID Level 13
Harddisk 5.2G

Encryption and decryption experiments for this system was


performed using several types of AES algorithm key-length,
start from 128 bit, 192 bit, and 256 bit. The result is the longer
the key-length which is use to encrypt the file, the bigger the
size of encrypted file and the longer the time that needed for
encryption. For digital signature experiment, The key length of
RSA algorithm did had been use for signature is 128 bit, 256
bit, 1024 bit, and 2048 bit. The result is, the file size of
encrypted file for each RSA key length is same, that is because
the algorithm for encryption file is AES, and RSA is an
algorithm for signature the file. The different between that
seevral key length of RSA is the time that needed for
generating the key. The longer the key length, the longer the
time that needed for generating the key.
RSA is an algorithm for signatures file, AES is an
algorithm for encryption. But, for this system, people who want
to decryption file need to get the public key of sender. Fig. 5. The result of fingerprint encryption process on smartphone
Although AES is an algorithm that use a symmetric key for
encryption file, this system allows the AES key to loaded If user did not have a fingerprint id on the smartphone, that
automatically when user as the receiver input the public key for user could not to signature the file. This system assumed can be
decrypting the file. For this system, the key length of AES that secure because only people who have a fingerprint access to
used for encryption is 256 bit, and the key length of RSA that the smartphone device who can signature the file an biometric
used for signature is 2048 bit. This system using the longest fingerprint data for each person is different, so it would not to
key between both of RSA and AES because the longest key be able to sabotage by other.
give the best security level. The benefit using encryption for
digital signature is the encrypted file cannot be read by another
people who not have access for document.

D. Experiment of Fingerprint Biometric for doing Digital


Signature using Fingerprint Sensor on Smartphone
This experiments hes been done using the smartphone
device with the specification based on table 2 :

TABLE II. SMARTPHONE SPESIFICATION

Device Spesification
Android Version 6.0.1
Fig. 6. Decryption process on server side
CPU Hexa-core Max 1.8GHz
Although this system using a symmetric cryptography
RAM 2.00 GB which is the encryption and decryption process was using a
Supported sSensors Fingerprint symmetric key, but in the practice, receiver who want to
decrypt an encrypted file must have a public key of sender.
According to figure 6, decryption process was done by using
With those specification device, time that needed for doing public key that generated by RSA algorithm. If receiver did
encryption is 15 second. 15 second time is a time for process not have a public key of sender, the receiver would never
the load key or key generating key for encryption and signature doing decryption process on document.
and also process to encrypting the file. The use of this short

237
V. CONCLUSION Science, Engineering and Information Technology (IJCSEIT). 2(1): 57-
65.
In encryption and decryption, the choices of key-length [2] Isobe, Y, et al. 2001. Development of Personal Authentication System
influence the filesize of encrypted file and also the long-time of Using Fingerprint with Digital Signature Technologies. Proceedings of
encryption process. Fingerprint program for smartphone can be the 34th Hawaii International Conference on System Science. 06 Januari
used to authenticate user. The user id of fingerprint cannot be 2001, Maui, Hawaii. pp. 1-9.
reach because it’s stored on a secure system of smartphone. [3] Munsyi, Amang Sudarsono, and M. Udin Harun Al Rasyid, “Secure
Fingerprint on smartphone can perform encryption and Data Sensor In Environmental Monitoring System Using Attribute-
Based Encryption With Encryption”, International Journal on Advanced
decryption process by connected to the server and call the PHP Science, Engineering and Information Technology, Vol 7, pp.609-624,
program functions. In this system, fingerprint is as a medium to 2017.
perform the process of encryption and decryption and create a [4] Yadav, Prasant Singh. Sharma, Pankaj. Yadav, Dr K.P. 2012.
signature on the document. Implementation Of Rsa Algorithm Using Elliptic Curve Algorithm For
Security And Performance Enhancement. International Journal of
Scientific & Technology Research 1(4):102-105.
ACKNOWLEDGMENT [5] Sadikin, Mohamad Ali. Wardhani, Rini Wisnu. 2016. Implementation of
The author would like to thanks to ministry of Research, RSA 2048-bit and AES 256-bit with Digital Signature for Secure
Technology, Higher Education of Indonesia. Electronic Health Record Application.
[6] Zhang, Xinmiao. Parhi, K Keshab. 2004. High-Speed VLSI
Architectures for the AES Algorithm. High-Speed VLSI Architectures
REFERENCES for the AES Algorithm. 12(9):957-967.
[1] Mudholkar, Smita, S. Shende, Pradnya, M. Sarode, Milind, V. 2012.
Biometrics Authentication Technique for Intrusion Detection System
Using Fingerprint Recognition. International Journal of Computer

238

S-ar putea să vă placă și