Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ ZENODOarrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Article . 2017
License: CC BY
Data sources: Datacite
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Article . 2017
License: CC BY
Data sources: Datacite
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Article . 2017
License: CC BY
Data sources: ZENODO
versions View all 2 versions
addClaim

Use Of Personal Rhythm To Authenticate Encrypted Messages

Authors: Carlos Gonzalez;

Use Of Personal Rhythm To Authenticate Encrypted Messages

Abstract

{"references": ["Bender, et al. \"Key sequence rhythm recognition system and method\", U.S. Pat. No. 7,206,938, April 2007.", "Bergadano et al., \"User authentication through keystroke dynamics\", ACM Transactions on Information and System Security, Volume 5 Issue 4, November 2002 Pages 367-397.", "Bryce, Scott, \"Cryptograms\", http://scottbryce.com/cryptograms/stats.htm, accessed March 20, 2015.", "Cho et al., \"Apparatus for authenticating an individual based on a typing pattern by using a neural network system\", U.S. Pat. No. 6,151,593, November 2000.", "Cornell University, \"English Letter Frequency\" https://www.math.cornell.edu/~mec/2003-2004/cryptography/subs/frequencies.htm, accessed Nov 18, 2016.", "Deng Y. and Zhong Y., \"Keystroke Dynamics User Authentication Based on Gaussian Mixture Model and Deep Belief Nets\", ISRN Signal Processing Volume 2013 (2013), Article ID 565183.", "Ferguson N., Schneier B., Kohno T. \"Cryptography Engineering. Design Principles and Practical Applications,\" Wiley Publishing, Inc., 2010.", "Garcia; John D. \"Personal identification apparatus\", U.S. Pat. No. 4,621,334, November 1986.", "Gonzalez C., Avila M., and Moreno R, \"Continuous Authentication Using User's Typing Rhythm and Application Selection for Security of Mobile Electronic Devices\", U.S. Patent Application #62295130, Feb 2016.\n[10]\tL\u00edvia et al., \"User Authentication Through Typing Biometrics Features\", IEEE Transactions on Signal Processing, Vol. 53, No. 2, February 2005.\n[11]\tRangnath Dholi P., Chaudhar K. P., \"Typing Pattern Recognition Using Keystroke Dynamics\", Mobile Communication and Power Engineering, Volume 296 of the. series Communications in Computer and Information Science pp 275-280, 2013.\n[12]\tSerpa, Michael Lawrence, \"System and method for user authentication with enhanced passwords\", U. S. Pat No. 6,954,862, Oct 2005.\n[13]\tLarry V. Hedges (1981). \"Distribution theory for Glass' estimator of effect size and related estimators\". Journal of Educational Statistics. 6 (2): 107\u2013128."]}

When communicating using private and secure keys, there is always the doubt as to the identity of the message creator. We introduce an algorithm that uses the personal typing rhythm (keystroke dynamics) of the message originator to increase the trust of the authenticity of the message originator by the message recipient. The methodology proposes the use of a Rhythm Certificate Authority (RCA) to validate rhythm information. An illustrative example of the communication between Bob and Alice and the RCA is included. An algorithm of how to communicate with the RCA is presented. This RCA can be an independent authority or an enhanced Certificate Authority like the one used in public key infrastructure (PKI).

Keywords

Personal rhythm, public-key encryption, digital signature, keystroke dynamics., authentication

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
    OpenAIRE UsageCounts
    Usage byUsageCounts
    visibility views 3
    download downloads 4
  • 3
    views
    4
    downloads
    Powered byOpenAIRE UsageCounts
Powered by OpenAIRE graph
Found an issue? Give us feedback
visibility
download
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
views
OpenAIRE UsageCountsViews provided by UsageCounts
downloads
OpenAIRE UsageCountsDownloads provided by UsageCounts
0
Average
Average
Average
3
4
Green