{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T14:10:07Z","timestamp":1773843007522,"version":"3.50.1"},"reference-count":73,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T00:00:00Z","timestamp":1544054400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>Authentication systems based on biometrics characteristics and data represents one of the most important trend in the evolution of the society, e.g., Smart City, Internet-of-Things (IoT), Cloud Computing, Big Data. In the near future, biometrics systems will be everywhere in the society, such as government, education, smart cities, banks etc. Due to its uniqueness, characteristic, biometrics systems will become more and more vulnerable, privacy being one of the most important challenges. The classic cryptographic primitives are not sufficient to assure a strong level of secureness for privacy. The current paper has several objectives. The main objective consists in creating a framework based on cryptographic modules which can be applied in systems with biometric authentication methods. The technologies used in creating the framework are: C#, Java, C++, Python, and Haskell. The wide range of technologies for developing the algorithms give the readers the possibility and not only, to choose the proper modules for their own research or business direction. The cryptographic modules contain algorithms based on machine learning and modern cryptographic algorithms: AES (Advanced Encryption System), SHA-256, RC4, RC5, RC6, MARS, BLOWFISH, TWOFISH, THREEFISH, RSA (Rivest-Shamir-Adleman), Elliptic Curve, and Diffie Hellman. As methods for implementing with success the cryptographic modules, we will propose a methodology which can be used as a how-to guide. The article will focus only on the first category, machine learning, and data clustering, algorithms with applicability in the cloud computing environment. For tests we have used a virtual machine (Virtual Box) with Apache Hadoop and a Biometric Analysis Tool. The weakness of the algorithms and methods implemented within the framework will be evaluated and presented in order for the reader to acknowledge the latest status of the security analysis and the vulnerabilities founded in the mentioned algorithms. Another important result of the authors consists in creating a scheme for biometric enrollment (in Results). The purpose of the scheme is to give a big overview on how to use it, step by step, in real life, and how to use the algorithms. In the end, as a conclusion, the current work paper gives a comprehensive background on the most important and challenging aspects on how to design and implement an authentication system based on biometrics characteristics.<\/jats:p>","DOI":"10.3390\/cryptography2040039","type":"journal-article","created":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T03:46:14Z","timestamp":1544154374000},"page":"39","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Security and Cryptographic Challenges for Authentication Based on Biometrics Data"],"prefix":"10.3390","volume":"2","author":[{"given":"Stefania Loredana","family":"Nita","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Bucharest, 030018 Bucharest, Romania"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9655-9666","authenticated-orcid":false,"given":"Marius Iulian","family":"Mihailescu","sequence":"additional","affiliation":[{"name":"Department of Data Systems, Royal Caribbean, Miami, FL 33132, USA"}]},{"given":"Valentin Corneliu","family":"Pau","sequence":"additional","affiliation":[{"name":"The Academy of Romanian Scientists, 050094 Bucharest, Romania"}]}],"member":"1968","published-online":{"date-parts":[[2018,12,6]]},"reference":[{"key":"ref_1","unstructured":"Iulian, M.M., Ciprian, R., Laurentiu, G.D., and Loredana, N.S. (2015, January 14\u201316). A Multi-Factor Authentication Scheme Including Biometric Characteristics as One Factor. Proceedings of the 1st International Conference Sea-Conf, Constanta, Romania."},{"key":"ref_2","unstructured":"Echeverria, J., and Spivey, B. (2015). Hadoop Security, O\u2019Reilly Media Publisher."},{"key":"ref_3","unstructured":"(2018, December 03). Cloudera Security. Available online: https:\/\/www.cloudera.com\/documentation\/enterprise\/5-6-x\/PDF\/cloudera-security.pdf."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"596","DOI":"10.1016\/j.procs.2015.04.091","article-title":"Big Data and Hadoop\u2014A Study in Security Perspective","volume":"50","author":"Saraladevi","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"ref_5","unstructured":"(2015). 75 Securing Big Data by Opting Hadoop Security: A Review of Past and Present. Int. J. Eng. Technol. Sci. Res., 2, 75\u201378."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1147\/rd.441.0206","article-title":"Some studies in machine learning using the game of checkers","volume":"44","author":"Samuel","year":"2000","journal-title":"IBM J. Res. Dev."},{"key":"ref_7","first-page":"4325","article-title":"Machine learning classification over encrypted data","volume":"4324","author":"Bost","year":"2015","journal-title":"NDSS"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"049901","DOI":"10.1117\/1.2819119","article-title":"Pattern recognition and machine learning","volume":"16","author":"Nasrabadi","year":"2007","journal-title":"J. Electron. Imaging"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1976","journal-title":"Commun. ACM"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Goldwasser, S., and Micali, S. (1982, January 5\u20137). Probabilistic encryption & how to play mental poker keeping secret all partial information. Proceedings of the Fourteenth Annual ACM Symposium on Theory of Computing, San Francisco, CA, USA.","DOI":"10.1145\/800070.802212"},{"key":"ref_11","unstructured":"Paillier, P. (1999, January 2\u20136). Public-key cryptosystems based on composite degree residuosity classes. Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Prague, Czech Republic."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Taylor, R.C. (2010). An overview of the Hadoop\/MapReduce\/HBase framework and its current applications in bioinformatics. BMC Bioinform., 11.","DOI":"10.1186\/1471-2105-11-S12-S1"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1145\/1327452.1327492","article-title":"MapReduce: Simplified data processing on large clusters","volume":"51","author":"Dean","year":"2007","journal-title":"Commun. ACM"},{"key":"ref_14","unstructured":"Alabdulatif, A., Khalil, I., Reynolds, M., Kumarage, H., and Yi, X. (2017, January 16\u201320). Privacy-preserving data clustering in cloud computing based on fully homomorphic encryption. Proceedings of the PACIS 2017: Societal Transformation through IS\/IT. Association for Information Systems (AIS), Langkawi, Malaysia."},{"key":"ref_15","unstructured":"(2018, December 05). 2035 Forecast Reveals Air Passengers Will Nearly Double to 7.8 Billion. Available online: http:\/\/www.iata.org\/pressroom\/pr\/Pages\/2017-10-24-01.aspx."},{"key":"ref_16","unstructured":"(2018, December 05). Identity Fraud Soars. Available online: https:\/\/www.cifas.org.uk\/newsroom\/identity-fraud-soars-to-new-levels."},{"key":"ref_17","unstructured":"(2018, December 05). More than One Billion Smartphones with Fingerprint Sensors Will Be Shipped in 2018. Available online: https:\/\/www.counterpointresearch.com\/more-than-one-billion-smartphones-with-fingerprint-sensors-will-be-shipped-in-2018\/."},{"key":"ref_18","unstructured":"(2018, December 05). Russian Chinese Firms win NIST-ARPA Face Recognition Contest. Available online: https:\/\/americansecuritytoday.com\/russian-chinese-firms-win-nistiarpa-face-recog-contest\/."},{"key":"ref_19","unstructured":"(2018, December 05). Back to Basics: Multi-Factor Authentication (MFA), Available online: https:\/\/www.nist.gov\/itl\/tig\/back-basics-multi-factor-authentication."},{"key":"ref_20","unstructured":"(2018, December 05). Bridging the Gap\u2014from Biometrics to Forensics, Available online: https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC4580999\/."},{"key":"ref_21","unstructured":"(2018, December 05). Interview with James Hammond, Associate Vice President for Information Technology Winthrop University. Available online: https:\/\/findbiometrics.com\/interview-with-james-hammond-associate-vice-president-for-information-technology-winthrop-university\/."},{"key":"ref_22","unstructured":"(2018, December 05). Video Face Recognition System Enabling Real-time Surveillance. Available online: http:\/\/www.nec.com\/en\/global\/techrep\/journal\/g16\/n01\/160108.html."},{"key":"ref_23","unstructured":"(2018, December 05). John Daugman, Evolving Methods in Iris Recognition \u2013 Presentation and implications from 200 Billion Iris Comparisons. Available online: http:\/\/www.cse.nd.edu\/BTAS_07\/John_Daugman_BTAS.pdf."},{"key":"ref_24","unstructured":"(2018, December 05). Biometrics Recently Published Results. Available online: https:\/\/biolab.csr.unibo.it\/FVCOnGoing\/UI\/Form\/PublishedAlgs.aspx."},{"key":"ref_25","unstructured":"(2018, August 25). Top Five Biometrics: Face, Fingerprint, Iris, Palm and Voice. Available online: https:\/\/www.bayometric.com\/biometrics-face-finger-iris-palm-voice\/."},{"key":"ref_26","unstructured":"(2018, December 05). Applied Recognition Achieves New Benchmark for Face Recognition Accuracy. Available online: http:\/\/www.biometricupdate.com\/201709\/applied-recognition-achieves-new-benchmark-for-face-recognition-accuracy."},{"key":"ref_27","unstructured":"(2018, December 05). The Limits of Facial Recognition. Available online: http:\/\/www.pbs.org\/wgbh\/nova\/next\/tech\/the-limits-of-facial-recognition\/."},{"key":"ref_28","unstructured":"(2018, December 05). Mitigating Bias in AI Models. Available online: https:\/\/www.ibm.com\/blogs\/research\/2018\/02\/mitigating-bias-ai-models\/."},{"key":"ref_29","unstructured":"(2018, December 05). Retinal Identification Based on an Improved Circular Gabor Filter and Scale Invariant Feature Transform, Available online: https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC3758647\/."},{"key":"ref_30","unstructured":"(2018, December 05). Password Cracking. Available online: https:\/\/en.wikipedia.org\/wiki\/Password_cracking."},{"key":"ref_31","unstructured":"(2018, December 05). Bond Fingerprint Technology. Available online: https:\/\/www.youtube.com\/watch?v=yP5ku2IJgAY."},{"key":"ref_32","unstructured":"(2018, December 05). Hackers Say They\u2019ve Broken Face ID a Week after iPhone X Release. Available online: https:\/\/www.wired.com\/story\/hackers-say-broke-face-id-security\/."},{"key":"ref_33","unstructured":"(2018, December 05). Germany\u2019s Facial Recognition Pilot Program Divides Public. Available online: http:\/\/www.dw.com\/en\/germanys-facial-recognition-pilot-program-divides-public\/a-40228816."},{"key":"ref_34","unstructured":"(2018, December 05). To Scan or Not to Scan: Surge in Lawsuits under Illinois Biometrics Law. Available online: https:\/\/www.mwe.com\/en\/thought-leadership\/publications\/2017\/11\/surge-in-lawsuits-under-illinois-biometrics-law."},{"key":"ref_35","unstructured":"(2018, December 05). A New Threat from an Old Source: Class Action Liability Under Illinois\u2019 Biometric Information Privacy Act. Available online: https:\/\/www.bakermckenzie.com\/en\/insight\/publications\/2017\/10\/illinois-biometric-information-privacy-act\/."},{"key":"ref_36","unstructured":"(2018, December 05). DNA Pioneer Condemns Plans to Retain Data on Innocent. Available online: https:\/\/www.theguardian.com\/politics\/2009\/may\/07\/dna-database-plans-condemned."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Li, S.Z., and Jain, A.K. (2015). Encyclopedia of Biometrics, Springer. [2nd ed.].","DOI":"10.1007\/978-1-4899-7488-4"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Engelsma, J., Cao, K., and Jain, A.K. (2018). RaspiReader: An Open Source Fingerprint Reader. IEEE Trans. Pattern Anal. Mach. Intell.","DOI":"10.1109\/TPAMI.2018.2858764"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Li, S., and Jain, A. (2009). Encyclopedia of Biometrics, Springer.","DOI":"10.1007\/978-3-642-27733-7"},{"key":"ref_40","unstructured":"Herschel, S.W.J. (1916). The Origin of Finger-Printing, Oxford University Press."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Chugh, T., Cao, K., and Jain, A.K. (2018). Fingerprint Spoof Buster: Use of Minutiae-centered Patches. IEEE Trans. Inf. Forensics Secur.","DOI":"10.1109\/TIFS.2018.2812193"},{"key":"ref_42","unstructured":"(2018, December 05). Lawful Basis Processing Unlocking EU General Data Protection. Available online: https:\/\/www.whitecase.com\/publications\/article\/chapter-7-lawful-basis-processing-unlocking-eu-general-data-protection."},{"key":"ref_43","unstructured":"(2018, December 05). GDPR: Things to Consider When Processing Biometric Data. Available online: https:\/\/www.itgovernance.eu\/blog\/en\/gdpr-things-to-consider-when-processing-biometric-data\/."},{"key":"ref_44","unstructured":"(2018, December 05). Why Are We Still Using Social Security Numbers as ID. Available online: http:\/\/money.cnn.com\/2017\/09\/13\/technology\/social-security-number-identification\/index.html."},{"key":"ref_45","unstructured":"(2018, December 05). Constitutional Validity of Aadhaar: The Arguments in Supreme Court so Far. Available online: http:\/\/www.thehindu.com\/news\/national\/constitutional-validity-of-aadhaar-the-arguments-in-supreme-court-so-far\/article22752084.ece."},{"key":"ref_46","unstructured":"(2018, December 05). This Creepy Technology Can Read Your Emotions as You Walk Down the Street. Available online: https:\/\/mashable.com\/2017\/07\/28\/russia-facial-recognition-emotion-ntechlab-findface."},{"key":"ref_47","unstructured":"(2018, December 05). Man\/Machine Interface. Available online: https:\/\/futurewrite.com\/presentations\/rich-miner.pdf."},{"key":"ref_48","unstructured":"(2018, December 05). Secure Smartphone App Could Replace Fraud-prone Paper Passports. Available online: https:\/\/www.theguardian.com\/money\/2017\/sep\/09\/secure-smartphone-app-replace-fraud-prone-paper-passports."},{"key":"ref_49","unstructured":"(2018, December 05). Cryptographically Futuristic Smart Locks for Your Home. Available online: https:\/\/www.techlicious.com\/guide\/5-futuristic-smart-locks-for-your-home\/."},{"key":"ref_50","unstructured":"(2018, December 05). Are Embedded Microchips Dangerous? Ask the Swedes\u2013and Pets. Available online: https:\/\/www.usatoday.com\/story\/tech\/talkingtech\/2017\/07\/25\/do-microchip-implants-pose-health-risks-ask-swedes-and-pets\/507408001\/."},{"key":"ref_51","unstructured":"(2018, December 05). MIT and Microsoft Research Made a \u2018Smart\u2019 Tattoo that Remotely Controls Your Phone. Available online: https:\/\/www.theverge.com\/circuitbreaker\/2016\/8\/13\/12460542\/mit-microsoft-research-gold-leaf-smart-temporary-tattoo."},{"key":"ref_52","unstructured":"(2018, December 05). A World First: Australia\u2019s Plan for Advanced Biometric Airport Checks. Available online: https:\/\/www.airport-technology.com\/features\/featurea-world-first-australias-plan-for-advanced-biometric-airport-checks-5808560\/."},{"key":"ref_53","unstructured":"(2018, December 05). The Body as Password. Available online: https:\/\/www.wired.com\/1997\/07\/biometrics-2\/."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"(2018, December 05). KFC China Is Using Facial Recognition Tech to Serve Customers\u2013but They Are Buying It?. Available online: https:\/\/www.theguardian.com\/technology\/2017\/jan\/11\/china-beijing-first-smart-restaurant-kfc-facial-recognition.","DOI":"10.1016\/S0969-4765(17)30185-6"},{"key":"ref_55","unstructured":"Iulian, M.M., and Loredana, N.S. (2015). Security of Biometrics Authentication Protocols: Practical and Theory Applications, LAP LAMBERT Academic Publishing."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"1459","DOI":"10.1016\/j.proeng.2014.03.142","article-title":"New Enrollment Scheme for Biometric Template using Hash Chaos-based cryptography","volume":"69","author":"Iulian","year":"2014","journal-title":"Procedia Eng."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Mandal, A.K., Parakash, C., and Tiwari, A. (2012, January 1\u20132). Performance evaluation of cryptographic algorithms: DES and AES. Proceedings of the 2012 IEEE Students\u2019 Conference on Electrical, Electronics and Computer Science (SCEECS), Bhopal, India.","DOI":"10.1109\/SCEECS.2012.6184991"},{"key":"ref_58","unstructured":"Nadeem, A., and Javed, M.Y. (2005, January 27\u201328). A performance comparison of data encryption algorithms. Proceedings of the First International Conference on Information and communication technologies (ICICT 2005), Karachi, Pakistan."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Bertman, S. (2005). Handbook to Life in Ancient Mesopotamia, Oxford University Press.","DOI":"10.1093\/oso\/9780195183641.001.0001"},{"key":"ref_60","unstructured":"Howley, V. (2018, December 05). Whipple, Supreme Court of New Hampshire, 48 NH 487. Available online: https:\/\/www.digitalistmag.com\/future-of-work\/2017\/05\/24\/electronic-signatures-ready-for-prime-time-after-148-years-05105719."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Savastano, M. (2017). Noncooperative Biometrics: Cross-Jurisdictional Concerns. Human Recognition in Unconstrained Environments, Academic Press. [1st ed.].","DOI":"10.1016\/B978-0-08-100705-1.00010-5"},{"key":"ref_62","unstructured":"Greenleaf, G. (2018, December 05). Global Data Privacy Laws: Forty Years of Acceleration (October 10, 2011). Available online: https:\/\/ssrn.com\/abstract=1946700."},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Matthew, P., and Anderson, M. (2016, January 13\u201315). Developing Coercion Detection Solutions for Biometric Security. Proceedings of the SIA Computing Conference, London, UK.","DOI":"10.1109\/SAI.2016.7556118"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1109\/TPAMI.2008.291","article-title":"The Biometric Menagerie","volume":"32","author":"Yager","year":"2010","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Sidlauskas, D., and Tamer, S. (2008). Hand Geometry Recognition. Handbook of Biometrics, Springer.","DOI":"10.1007\/978-0-387-71041-9_5"},{"key":"ref_66","unstructured":"(2018, December 05). Dr. Patrick Vallance, Biometrics: A Guide, Available online: https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/715925\/biometrics_final.pdf."},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Jain, A.K., Patrick, F., and Arun, R. (2008). Handbook of Biometrics, Springer.","DOI":"10.1007\/978-0-387-71041-9"},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Mai, G., Cao, K., Yuen, P.C., and Jain, A.K. (2018). On the Reconstruction of Face Images from Deep Face Templates. IEEE Trans. Pattern Anal. Mach. Intell.","DOI":"10.1109\/TPAMI.2018.2827389"},{"key":"ref_69","unstructured":"Tabassi, E., Quinn, G.W., and Grother, P.J. (2006, January 17\u201322). When to Fuse Two Biometrics. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. Workshop on Biometrics, New York, NY, USA."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1016\/j.ins.2017.05.041","article-title":"Person recognition based on touch screen gestures using computational intelligence methods","volume":"415\u2013416","author":"Rzecki","year":"2017","journal-title":"Inf. Sci."},{"key":"ref_71","first-page":"1","article-title":"Gender Shades: Intersectional Accuracy Disparities in Commercial Gender Classification","volume":"81","author":"Buolamwini","year":"2018","journal-title":"Proceeds Mach. Learn. Res."},{"key":"ref_72","unstructured":"(2018, December 03). Sir Francis Galton, Finger Prints, Macmillan. On the Uniqueness of Fingerprints. Available online: http:\/\/biometrics.cse.msu.edu\/Presentations\/AnilJain_UniquenessOfFingerprints_NAS05.pdf."},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Cao, K., and Jain, A.K. (2018). Automated Latent Fingerprint Recognition. IEEE Trans. Pattern Anal. Mach. Intell.","DOI":"10.1109\/TPAMI.2018.2818162"}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/2\/4\/39\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:31:43Z","timestamp":1760196703000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/2\/4\/39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,6]]},"references-count":73,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2018,12]]}},"alternative-id":["cryptography2040039"],"URL":"https:\/\/doi.org\/10.3390\/cryptography2040039","relation":{"has-preprint":[{"id-type":"doi","id":"10.20944\/preprints201810.0618.v1","asserted-by":"object"}]},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,6]]}}}