Using voice to generate cryptographic keys

@inproceedings{Monrose2001UsingVT,
  title={Using voice to generate cryptographic keys},
  author={Fabian Monrose and Michael K. Reiter and Qi Li and Susanne Wetzel},
  booktitle={Odyssey},
  year={2001}
}
In this position paper, we motivate and summarize our work on repeatably generating cryptographic keys from spoken user input. The goal of this work is to enable a device to generate a key (e.g., for encrypting files) upon its user speaking a chosen password (or passphrase) to it. An attacker who captures the device and extracts all information it contains, however, should be unable to determine this key. We outline our approach for achieving this goal and present preliminary empirical results… CONTINUE READING
Highly Cited
This paper has 119 citations. REVIEW CITATIONS

5 Figures & Tables

Topics

Statistics

051015'00'02'04'06'08'10'12'14'16'18
Citations per Year

119 Citations

Semantic Scholar estimates that this publication has 119 citations based on the available data.

See our FAQ for additional information.