{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:58:01Z","timestamp":1772042281202,"version":"3.50.1"},"reference-count":9,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2024,4,6]],"date-time":"2024-04-06T00:00:00Z","timestamp":1712361600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>Biometric authentication methods offer high-quality mechanisms to confirm the identity of individuals in security systems commonly used in the modern world, such as physical access control, online banking, or mobile device unlocking. They also find their application in cryptographic solutions, which allow the biometrically authenticated exchange of cryptographic keys between users and services on the internet, despite the fuzziness of biometric data. Such solutions are BAKE (biometrics-authenticated key exchange) and BRAKE (biometric-resilient authenticated key exchange) protocols, upon which our work is based. However, the direct application of fuzzy biometrics in cryptography, which relies heavily on the accuracy of single-bit secret values, is not trivial. Therefore, this paper is devoted to analyzing the security of this idea and the feasibility of implementing biometric AKE (authenticated key exchange) protocols, with an emphasis on the BRAKE protocol. As the results of our analysis, we discuss BRAKE\u2019s limitations and vulnerabilities, which need to be appropriately addressed to implement the protocol in modern systems.<\/jats:p>","DOI":"10.3390\/cryptography8020014","type":"journal-article","created":{"date-parts":[[2024,4,8]],"date-time":"2024-04-08T03:11:33Z","timestamp":1712545893000},"page":"14","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Analysis of Biometric-Based Cryptographic Key Exchange Protocols\u2014BAKE and BRAKE"],"prefix":"10.3390","volume":"8","author":[{"given":"Maksymilian","family":"Gorski","sequence":"first","affiliation":[{"name":"Faculty of Information and Communication Technology, Wroclaw University of Science and Technology, Wybrzeze Wyspianskiego 27, 50-370 Wroclaw, Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0237-2882","authenticated-orcid":false,"given":"Wojciech","family":"Wodo","sequence":"additional","affiliation":[{"name":"Faculty of Information and Communication Technology, Wroclaw University of Science and Technology, Wybrzeze Wyspianskiego 27, 50-370 Wroclaw, Poland"}]}],"member":"1968","published-online":{"date-parts":[[2024,4,6]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Wang, M., He, K., Chen, J., Li, Z., Zhao, W., and Du, R. (2021, January 15\u201319). Biometrics-Authenticated Key Exchange for Secure Messaging. Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea.","DOI":"10.1145\/3460120.3484746"},{"key":"ref_2","unstructured":"Bauspie\u00df, P., Silde, T., Poljuha, M., Tullot, A., Costache, A., Rathgeb, C., Kolberg, J., and Busch, C. (2022). BRAKE: Biometric Resilient Authenticated Key Exchange, IEEE. Available online: https:\/\/eprint.iacr.org\/2022\/1408."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Ostrovsky, R., Reyzin, L., and Smith, A. (2006). Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. arXiv.","DOI":"10.1007\/978-1-84628-984-2_5"},{"key":"ref_4","unstructured":"Juels, A., and Sudan, M. (2002). A Fuzzy Vault Scheme, IEEE. Available online: https:\/\/eprint.iacr.org\/2002\/093."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1049\/iet-bmt.2014.0093","article-title":"Unlinkable minutiae-based fuzzy vault for multiple fingerprints","volume":"5","author":"Tams","year":"2016","journal-title":"IET Biom."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Casacuberta, S., Hesse, J., and Lehmann, A. (2022, January 6\u201310). SoK: Oblivious Pseudorandom Functions. Proceedings of the 2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), Genoa, Italy.","DOI":"10.1109\/EuroSP53844.2022.00045"},{"key":"ref_7","unstructured":"Guruswami, V., and Sudan, M. (1998, January 8\u201311). Improved decoding of Reed-Solomon and algebraic-geometric codes. Proceedings of the 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280), Palo Alto, CA, USA."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1137\/0108018","article-title":"Polynomial Codes Over Certain Finite Fields","volume":"8","author":"Reed","year":"1960","journal-title":"J. Soc. Ind. Appl. Math."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1016\/j.procs.2021.08.003","article-title":"Cybersecurity and Sustainable Development","volume":"192","author":"Sulich","year":"2021","journal-title":"Procedia Comput. Sci."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/8\/2\/14\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T14:24:03Z","timestamp":1760106243000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/8\/2\/14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,6]]},"references-count":9,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024,6]]}},"alternative-id":["cryptography8020014"],"URL":"https:\/\/doi.org\/10.3390\/cryptography8020014","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,6]]}}}