Use of Personal Rhythm to Authenticate Encrypted Messages
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33114
Use of Personal Rhythm to Authenticate Encrypted Messages

Authors: Carlos Gonzalez

Abstract:

When communicating using private and secure keys, there is always the doubt as to the identity of the message creator. We introduce an algorithm that uses the personal typing rhythm (keystroke dynamics) of the message originator to increase the trust of the authenticity of the message originator by the message recipient. The methodology proposes the use of a Rhythm Certificate Authority (RCA) to validate rhythm information. An illustrative example of the communication between Bob and Alice and the RCA is included. An algorithm of how to communicate with the RCA is presented. This RCA can be an independent authority or an enhanced Certificate Authority like the one used in public key infrastructure (PKI).

Keywords: Personal rhythm, public-key encryption, authentication, digital signature, keystroke dynamics.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1132020

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1052

References:


[1] Bender, et al. “Key sequence rhythm recognition system and method”, U.S. Pat. No. 7,206,938, April 2007.
[2] Bergadano et al., “User authentication through keystroke dynamics”, ACM Transactions on Information and System Security, Volume 5 Issue 4, November 2002 Pages 367-397.
[3] Bryce, Scott, “Cryptograms”, http://scottbryce.com/cryptograms/stats.htm, accessed March 20, 2015.
[4] Cho et al., “Apparatus for authenticating an individual based on a typing pattern by using a neural network system”, U.S. Pat. No. 6,151,593, November 2000.
[5] Cornell University, “English Letter Frequency” https://www.math.cornell.edu/~mec/2003-2004/cryptography/subs/frequencies.htm, accessed Nov 18, 2016.
[6] Deng Y. and Zhong Y., “Keystroke Dynamics User Authentication Based on Gaussian Mixture Model and Deep Belief Nets”, ISRN Signal Processing Volume 2013 (2013), Article ID 565183.
[7] Ferguson N., Schneier B., Kohno T. “Cryptography Engineering. Design Principles and Practical Applications,” Wiley Publishing, Inc., 2010.
[8] Garcia; John D. “Personal identification apparatus”, U.S. Pat. No. 4,621,334, November 1986.
[9] Gonzalez C., Avila M., and Moreno R, “Continuous Authentication Using User’s Typing Rhythm and Application Selection for Security of Mobile Electronic Devices”, U.S. Patent Application #62295130, Feb 2016.
[10] Lívia et al., “User Authentication Through Typing Biometrics Features”, IEEE Transactions on Signal Processing, Vol. 53, No. 2, February 2005.
[11] Rangnath Dholi P., Chaudhar K. P., “Typing Pattern Recognition Using Keystroke Dynamics”, Mobile Communication and Power Engineering, Volume 296 of the. series Communications in Computer and Information Science pp 275-280, 2013.
[12] Serpa, Michael Lawrence, “System and method for user authentication with enhanced passwords”, U. S. Pat No. 6,954,862, Oct 2005.
[13] Larry V. Hedges (1981). "Distribution theory for Glass' estimator of effect size and related estimators". Journal of Educational Statistics. 6 (2): 107–128.