We have difficulties to remember long cryptographic keys, and when we encrypt our data, cryptographic keys are provided by a third party, so it can be shared to a hacker. Therefore to solve this problem, for a long time period researchers have been discovering new ways to use biometric features of the user, which are memorable and totally independent from any third party cryptographic key provider. The effort to produce tough and unique cryptographic keys, and to organize the key, is unpredictable to a hacker who is deficient of valued knowledge about the user biometrics. In this paper, we...
We have difficulties to remember long cryptographic keys, and when we encrypt our data, cryptographic keys are provided by a third party, so it can be...