Encryption method takes authentication to a new level

September 30, 2016, VTT Technical Research Centre of Finland
Credit: VTT Technical Research Centre of Finland

VTT Technical Research Centre of Finland has developed new kinds of encryption methods for improving the privacy protection of consumers to enable safer, more reliable and easier-to-use user authentication than current systems allow.

The method combines safety, usability and , when, until now, implementing all three at the same time has been a challenge.

"Our method protects, for example, the user's or typing style," says Senior Scientist Kimmo Halunen.

In , the risk is that a person's permanent biometric identifiers, which cannot be changed, leak out of the database. VTT's method stores data in the database in an encrypted form and all comparisons between measuring results and the database are conducted using encrypted messages so there is no need to open any biometric data at this stage of the process.

VTT integrates new kind of encryption methods, such as homomorphic cryptography and secure exchange of cryptographic keys, to known measuring methods of typing styles.

The traditional authentication based on passwords has proved to be weak, since users mostly select weak passwords, and hackers often succeed in stealing quite large password databases. Recently, companies such as Dropbox and Yahoo have fallen prey to such .

In addition, new types of user environments, such as smart devices, cars, and home appliances, create challenges for user authentication with the help of passwords.

VTT is now looking for a partner for further processing and commercialisation of this method, which could be available to consumers within a year or two.

Explore further: Technology to securely turn biometric data into a cryptographic key

Related Stories

Can typing habits prevent cybercrime?

September 11, 2015

New research published in Journal of Applied Security Research proposes a new keystroke algorithm which intends on making online authentication processes more secure, reliable, and cheap. The new method hopes to alleviate ...

Comfort is important in identification

December 10, 2015

VTT Technical Research Centre of Finland has conducted a study about user attitudes to different personal identification methods. The most popular identification methods were internet banking access codes and passwords. The ...

Phoney protection for passwords

May 4, 2016

Corporate data breaches seem to be on the rise, rarely a week passes without a company revealing that its database has been hacked and regrettably usernames, passwords, credit card details and its customers' personal information ...

Recommended for you

Light-based production of drug-discovery molecules

February 18, 2019

Photoelectrochemical (PEC) cells are widely studied for the conversion of solar energy into chemical fuels. They use photocathodes and photoanodes to "split" water into hydrogen and oxygen respectively. PEC cells can work ...

Sound waves let quantum systems 'talk' to one another

February 18, 2019

Researchers at the University of Chicago and Argonne National Laboratory have invented an innovative way for different types of quantum technology to "talk" to each other using sound. The study, published Feb. 11 in Nature ...

Engineered metasurfaces reflect waves in unusual directions

February 18, 2019

In our daily lives, we can find many examples of manipulation of reflected waves, such as mirrors, or reflective surfaces for sound that improve auditorium acoustics. When a wave impinges on a reflective surface with a certain ...

0 comments

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.