Cryptographic key generation from voice

F. Monrose, M. K. Reiter, Q. Li, S. Wetzel

Research output: Contribution to journalConference articlepeer-review

258 Scopus citations

Abstract

We propose a technique to reliably generate a cryptographic key from a user's voice while speaking a password. The key resists cryptanalysis even against an attacker who captures all system information related to generating or verifying the cryptographic key. Moreover, the technique is sufficiently robust to enable the user to reliably regenerate the key by uttering her password again. We describe an empirical evaluation of this technique using 250 utterances recorded from 50 users.

Original languageEnglish
Pages (from-to)202-213
Number of pages12
JournalProceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
StatePublished - 2001
Event2001 IEEE Symposium on Security and Privacy - Oakland, CA, United States
Duration: 13 May 200116 May 2001

Fingerprint

Dive into the research topics of 'Cryptographic key generation from voice'. Together they form a unique fingerprint.

Cite this