Using voice to generate cryptographic keys

Fabian Monrose, Michael K. Reiter, Qi Li, Susanne Wetzel

Research output: Contribution to conferencePaperpeer-review

60 Scopus citations

Abstract

In this position paper, we motivate and summarize our work on repeatably generating cryptographic keys from spoken user input. The goal of this work is to enable a device to generate a key (e.g., for encrypting files) upon its user speaking a chosen password (or passphrase) to it. An attacker who captures the device and extracts all information it contains, however, should be unable to determine this key. We outline our approach for achieving this goal and present preliminary empirical results for it. We also describe several directions for future work.

Original languageEnglish
Pages237-242
Number of pages6
StatePublished - 2001
EventSpeaker Recognition Workshop 2001: A Speaker Odyssey, ODYSSEY 2001 - Crete, Greece
Duration: 18 Jun 200122 Jun 2001

Conference

ConferenceSpeaker Recognition Workshop 2001: A Speaker Odyssey, ODYSSEY 2001
Country/TerritoryGreece
CityCrete
Period18/06/0122/06/01

Fingerprint

Dive into the research topics of 'Using voice to generate cryptographic keys'. Together they form a unique fingerprint.

Cite this