What is it about?

Information security keys for the AES-128, 192, and 256-bit encryption algorithms. The proposed method uses the Zernike Moments technique to extract discriminating features from the human iris. Then, these features will be normalized and passed to Bezier and BSpline interpolators to produce approximation curves. For AES-128 bits, the next step is to choose certain common points between these sets to generate the encryption key. The advantage of the proposed method is that it combines the biometric characteristics of the human iris with Bezier and B-spline interpolations to generate a strong encryption key. Testing and evaluation of the proposed method reveal that it is efficient to generate very strong AES-keys with an excellent mixture of uniqueness and randomization when it comes to resisting brute-force attacks.

Featured Image

Why is it important?

Key generation is a highly crucial step in information security. Strong keys must practice randomness and confusion. Generally, keys can be generated using different techniques, such as choosing random numbers manually or by mathematical approach, hashing algorithms, biometrics, etc. In this paper, we propose an interesting system to generate secure keys that are used in the AES-128, 192, and 256-bit encryption algorithms. The proposed system is based on the adoption of several techniques in one integrated system, where one technique can compensate for the shortcomings of another. The suggested system extracts discriminatory features from the human iris using the Zernike Moments technique.

Perspectives

its about generating secure key

Hussein Kaabi
University of Baghdad

Read the Original

This page is a summary of: Extract features using Zernike Moment to generate symmetric encryption key with polynomial interpolations, January 2025, American Institute of Physics,
DOI: 10.1063/5.0258437.
You can read the full text:

Read

Contributors

The following have contributed to this page