Saturday 18 February 2012

How Biometric Fingerprint Security Works




Fingerprint identification is based on the anatomical truth that no two fingerprints are identical. Each person’s fingerprint has unique prominent features called arches, loops and whorls. These characteristic fingerprint curves are the most common types of fingerprint patterns. Though these fingerprint characteristics are distinct, without the aid of scanners, cable of reading detailed features, identification would be problematic. For example, if the sample print impression is smudged, dirty or distorted proper identification of the print’s pattern may be compromised. In this case, making an accurate assessment based on fingerprint identification is unreliable.

Today, with the introduction of sophisticated biometric scanners,verification of anyone’s fingerprint can be done accurately by looking at minutiae details and variations within the larger characteristics of a print’s arches, loops and whorls. When a fingerprint is scanned using a biometric device, the sample data is interpreted as various shades of gray patterns. Each gray pixel is designated a specific numerical value. The gray-scale pattern created is processed by a complex biometric security program. A mathematical algorithm examines places of light and dark points of the fingerprint sample data acquired. This analysis will determine whether the fingerprint ridges are divided or ended. The biometric program is designed to analyze theses minute ridge splits and endings, ascertaining their positions relative to the core of the print as compared to another.

In addition, the system also analyzes and compares the angle of ridges of sample print data. These anatomically specific relationships imaged will remain unaltered even if the fingerprint data is smudged, dirty or even distorted. Thus, a biometric system can accurately determine the identification of one fingerprint as compared to another fingerprint.

For secure identification several original fingerprint scans are taken and manipulated by a biometric algorithm to create a template of the print which is stored on the biometric device. The duplication process allows the algorithm to collect and compare fingerprint data acquired. This is done to ensure 100% authenticity of the template to being stored.
Once the template has been successfully created, an authorized user wishing to gain access to a secure area or device merely enters their security code or password to call up the fingerprint data template stored. The user’s fingerprint is scanned and compared to biometric fingerprint template for identity verification.

Biometric secure door locks usually require both a password code and fingerprint scan before allowing access as a failsafe protocol. However, secure biometric USB flash disk allow a user access by confirming their fingerprint via a scanning process or by entering the correct password.

During fingerprint verification phase the user allows their print to be scanned by the biometric device. If the match is close enough to stored data template, access will be granted. If not, another scan will be necessary until the scan matches secure data template created originally by biometric algorithm.

Biometric secure devices cannot be circumvented because anatomically no two people have identical fingerprints. Secure biometric systems use a complex mathematical algorithm to determine if the print scanned matches the fingerprint template data stored. Once verification is confirmed the user is allowed access.
The analysis and scanning process takes into consideration minute details of a fingerprint’s ridges and ends. Therefore, the fingerprint scanned must match exactly the fingerprint data which is stored on the biometric device.

Original article posted on EnzineArticles.com

Wednesday 1 February 2012

Historical Uses of Encryption During Warfare

In ancient times the ability to encrypt military communications played a significant role in the success of military campaigns waged by various city-states or countries seeking to gain or maintain regional dominance. The science of cryptology, in essence, is the study of codes and cipher devices used to create and decipher codes. The word cryptology comes from the Greek root for “hidden meaning.”

In the early 5th century B.C. rulers of Sparta, which was the predominant military power of ancient Greece, employed an ingenious cipher device called a scytale to encrypted military communication between government officials and generals executing their military agenda. Sparta was a militaristic Greek city-state with coveted military operational secrets which their enemies would try to obtain. Therefore, the rulers of Sparta needed to employ the latest secure encryption technology to protect vital military secrets and communications from enemy spies seeking to obtain Sparta’s military secrets for their respective governments.

As in all military campaigns communications between government officials and those executing the military campaigns are vital. The interception of military communications by the enemy could prove disastrous. Therefore, every effort was put forth by Spartan officials to protect communications to their commanders in the field.

Enemy states would go to great lengths to secure military secrets which could be used against perceived aggressors. Securing military intelligence by using spies is common practice during military campaigns, even today. Sparta’s rulers were pioneers in using encryption techniques to ensure their military secrets stayed secret.

Sparta developed a ciphering device called a scytale. This was a baton shaped object with a long sheet of parchment papered wrapped around in a spiraling pattern. A Spartan official or commander would write a message along the length of the baton.
The unwrapped parchment paper would render the message into an unintelligible or scrambled message which could now be safely transported via courier to the intended general in command. If by any chance the message was intercepted by enemy agents, the message on the parchment paper could not be read or decipher because a specific key was required to successfully decode the hidden message. The key was only known by person sending the message and the person receiving the message.

The key, in this case, was a baton of exact shape and dimensions of the original baton used to create the message. When the message was received, by the intended party, they simply wrapped the parchment around their baton or (key) revealing the encrypted message which was now decoded and easily read.

The scytale is the first known use of transposition, a classic encryption technique. Transposition uses permutations or algorithms to determine specific arrangements of alpha numeric characters to encode a message. For example, the letter “A” could equal “C”, while the letter “C” equals “A” and the letter “U” equals “T”. Therefore, ACU decoded yields CAT. Numbers could also be used as substitutes for each letter of the alphabet. The transposing of characters can be very simple or complex depending on the mathematical algorithm used to encode the message.

Transposing alpha numeric characters is only one method of encrypting data or communications. During ancient times transposition was considered cutting edge technology. Sparta’s rulers understood the importance of protecting and maintaining military secrets. No expense was spared in the development of more sophisticated methods of protecting their military intelligence.

The scytale, though seemingly crude by current standards, severed its purpose well because Sparta’s enemies could not easily decipher their military communications. Information is power and Sparta’s enemies’ deployed spies and other methods in attempts to secure Sparta’s military secrets. Obtaining military secrets from an enemy or aggressor could be the difference between conquering an enemy or subjugation.

In the modern age of advanced computer power, fueled by powerful microchip technology, the necessity to protect sensitive or confidential information is extremely important. In the information age digital data flowing through the internet stored on massive hard drives or personal computers is fodder which feeds our technological society. Keeping and maintaining the integrity of information, digital data or otherwise is vital. The interception or misuse use of information could potential lead to disastrous consequences whether on a government, corporate or individual level. The issue of protecting privacy has never been more important.

http://EzineArticles.com/?expert=Carl_B_Jones_II