Biometric Key Generators
  Generating Cryptographic keys from biometrics

Extending our prior work on generating repeatable cryptographic keys from habitual patterns in a user's typing rhythm, we are currently exploring ways of achieving similar goals using features in a user's voice. Our main focus here is in reliably generating strong cryptographic keys for use in 3G phones, PDAs, and the like. We've developed some techniques for doing so and have been implementing them on devices for a while now. Getting this right has been much more challenging than we first thought.

•    Fabian Monrose, Michael K. Reiter, Q. (Peter) Li , Susanne Wetzel. Using Voice to Generate Cryptographic Keys. In 2001: A Speaker Odyssey. The Speech Recognition Workshop, Crete, Greece, June, 2001. (PDF). 

•    Fabian Monrose, Michael K. Reiter, Q. (Peter) Li , Susanne Wetzel. Cryptographic Key Generation From Voice. In Proceedings of the IEEE Conference on Security and Privacy, Oakland, CA. May, 2001. (PDF)

  1.     Fabian Monrose, Michael K. Reiter, Q. (Peter) Li , Daniel Lopresti, Chilin Shih. Towards Voice Generated Cryptographic Keys on Resource Constrained Devices. In Proceedings of  the 11th USENIX Security Symposium, August, 2002.(PDF)                   

  2.      Lucas Ballard, Seny Kamara, Michael K. Reiter, and Fabian Monrose. Towards Practical Biometric Key Generation with Randomized Biometric Templates. In proceedings of 15th ACM Conference on Computer and Communications Security,  October 2008 (PDF).


  1.     Jin Chen, Dan Lopresti and Fabian Monrose. Towards Resisting Forgery Attacks via Pseudo-Signatures. In proceedings of 10th International Conference on Document Analysis and Recognition (ICDAR), July, 2009 (PDF).

    Evaluation techniques for Biometric Key Generators 

Revisiting the current practices in reporting biometric performance. Here, we show the impact of incorporating stronger adversarial assumptions when performing such evaluations. Come back here for some more updates soon...

◦Lucas Ballard, Fabian Monrose and Daniel Lopresti. Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's Clothing. In proceedings of the 15th USENIX Security Symposium, Vancouver, Aug. 2006.(PDF)


◦Lucas Ballard, Daniel Lopresti and F. Monrose. Evaluating the Security of Handwriting Biometrics. In proceedings of the 10th International Workshop on Frontiers in Handwriting Recognition (IWFHR06), France, October, 2006.(PDF)

◦Daniel Lopresti, Lucas Ballard and F. Monrose. Evaluating Biometric Security (Invited Paper). In proceedings of First Korean-Japan Workshop on Pattern Recognition, Nov, 2006.

◦Lucas Ballard, Daniel Lopresti and Fabian Monrose. Forgery Quality and its Implications for Behavioral Biometric Security. In IEEE Transactions on Systems, Man, and Cybernetics (Special Edition), Volume 37, no. 5, October, 2007. (PDF)

◦Lucas Ballard, Seny Kamara and M.K. Reiter. The Practical Subtleties of Biometric Key Generation. To Appear in Proceedings of the 17th Annual USENIX Security Symposium, 2008. This paper supercedes our earlier tech report and is part of Lucas' thesis, Robust Techniques for Evaluating Biometric Cryptographic Key Generators, March, 2008.