Hindawi Journal of Electrical and Computer Engineering Volume 2017, Article ID 9598581, 6 pages https://doi.org/10.1155/2017/9598581
Research Article A Student Information Management System Based on Fingerprint Identification and Data Security Transmission Pengtao Yang, Guiling Sun, Jingfei He, Peiyao Zhou, and Jiangjiang Liu College of Electronic Information and Optical Engineering, Nankai University, Tianjin 300350, China Correspondence should be addressed to Guiling Sun;
[email protected] Received 18 February 2017; Revised 17 July 2017; Accepted 17 August 2017; Published 19 September 2017 Academic Editor: Liangmin Wang Copyright Β© 2017 Pengtao Yang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. A new type of student information management system is designed to implement student information identification and management based on fingerprint identification. In order to ensure the security of data transmission, this paper proposes a data encryption method based on an improved AES algorithm. A new π-box is cleverly designed, which can significantly reduce the encryption time by improving ByteSub, ShiftRow, and MixColumn in the round transformation of the traditional AES algorithm with the process of look-up table. Experimental results show that the proposed algorithm can significantly improve the encryption time compared with the traditional AES algorithm.
1. Introduction At present, there are a large number of college students, so the identification and verification of student identity information occur at all times in the campus, as well as the corresponding services given by the studentsβ identification. Therefore, safe and efficient student information management, convenient identification to obtain the required service, and safe and reliable information transmission have become an important task for the student information management [1β3]. Three main features of the proposed system are the following: (1) This system uses the fingerprint identification terminal to collect the fingerprint information. By means of replacing the campus card with the physiological characteristics of lifelong invariance, uniqueness, and convenience, it has become the basis of student identity authentication. The maturity of the fingerprint identification technology ensures the safety and speed of the process and also eliminates the disadvantages of the campus card which is easy to be stolen and forged and easily lost. (2) In order to ensure the safety of the studentsβ information, the fingerprint characteristic value is encrypted and transmitted, using the improved AES encryption
algorithm [4], which has the same security guarantee with traditional AES algorithm but reduces the required time for encryption. Therefore, this student management system not only is convenient for students in the college, but also protects the privacy of students. (3) After the system has been built, because it is easy to maintain and popularize, the modular system design is easier to improve, and it can be widely used in other fields.
2. Description of the Student Information Management System The system is mainly composed of two parts: terminal and host computer. The terminal is composed of fingerprint identification module and micro controller. The host computer can use personal computers or large servers according to the number of users, and the management of student information database uses SQL Server. The terminal fingerprint sensor uses optical fingerprint recognition module, while the microcontroller uses STM32F4, with 192 KB of SRAM [5]. Each terminal processes and encrypts the collected fingerprint data and then transmits it to the host computer. To ensure the safety of data, the fingerprint data is only stored in the host
2
Journal of Electrical and Computer Engineering
Host computer
Terminal microprocessor
Terminal microprocessor
Terminal microprocessor Β·Β·Β·
Fingerprint recognition module
Fingerprint recognition module
Fingerprint recognition module
Terminal 1
Terminal 2
Terminal N
Figure 1: System structure diagram.
The student requests the service and enters the fingerprint information Terminal microprocessor
Fingerprint recognition module
Transmit fingerprint information to the host computer database
Students
Return the results after comparison
Students get a response
Get a response after verifying permissions Administrator
Host computer Administrator uses the permission request to view the data
Figure 2: System flow diagram.
computer database, and the terminals are only responsible for collection and processing. The system structure is shown in Figure 1.
3. Implementation of the Student Information Management System The system collects fingerprints through the terminal fingerprint identification sensor. And the microprocessor processes and encrypts the fingerprint information and then transmits it to the server. On the server side, it compares the fingerprint information transmitted from terminal with the fingerprint information stored in the server database. If the identity is consistent, the user is allowed to operate by verification. The overall process is shown in Figure 2.
4. Data Transmission Encryption Method In order to achieve the campus student consumption, identity registration, and other functions, the student information identification management system based on fingerprint identification and data security transmission needs to transmit student fingerprint information, identity information, and bank card information among the terminal. There is a risk of being intercepted during data transmission. Studentsβ private information has a high commercial value; once intercepted by criminals, the consequences could be disastrous. When using plaintext transmission, security is very low; therefore, the entire data transmission using ciphertext transmission, to achieve a plaintext view and ciphertext transmission effect, greatly improve the security, so that criminals cannot take the opportunity. In order to ensure the security of encrypted
Journal of Electrical and Computer Engineering
3
transmission and user-friendliness, the encryption process uses the optimized AES algorithm. AES algorithm is a variable data block length and variable key length iterative block cipher algorithm, and the length of the data block and the key length can be 128, 192, or 256 bits [6]. The most important operation in the AES algorithm is the round transformation operation, where the various operations applied to the process give a high encryption strength. The round transformation operation consists of four steps: ByteSub, ShiftRow, MixColumn, and AddRoundKey, and these steps will be mathematically transformed to eventually construct a new π-box [7, 8]. 4.1. Matrix Representation of AES Algorithm Round Transformation. AES algorithm mainly consists of three modules: encryption module, decryption module, and key expansion module. Each round transformation of the encryption module consists of ByteSub, ShiftRow, MixColumn, and AddRoundKey four operations [9]. The decryption module is also composed of four similar operations; the difference is that ByteSub, ShiftRow, and MixColumn are the inverse operation of the encryption module. And the extension key used in AddRoundKey is generated by the key expansion module. The encryption module and the decryption module are the core of the AES algorithm, which are the repetition process of the round transformation, so the simplified round function can improve the operation speed of the AES algorithm [10, 11]. For convenience of description, 128-bit (16 bytes) data is used here and the key is 128 bits. In the ByteSub transformation, it is assumed that the input is π΄, π΄ = [ππ,π ], (0 β€ π, π β€ 3); output is π΅, π΅ = [ππ,π ], (0 β€ π, π β€ 3). ByteSub transformation can be expressed as π΅ = (π΄) .
(1)
And it can also written as ππ,π = π΅ (ππ,π ) .
(2)
In practice, this transformation can be converted to lookup table operation. The table is the AES algorithm byte conversion table, also known as π box. In the ShiftRow transformation, the schematic diagram is shown in Figure 3. It is assumed that the output is πΆ, πΆ = [ππ,π ], (0 β€ π, π β€ 3). Then πΆ can be expressed as a matrix: π0,π
π0,(π+0)%4
] [ ] [ [π1,π ] [π1,(π+1)%4 ] ]. [ ]=[ ] [π ] [π [ 2,π ] [ 2,(π+2)%4 ] [π3,π ] [π3,(π+3)%4 ]
(3)
In the MixColumn transformation, each column of the state array obtained in ShiftRow is treated as a polynomial on GF(28 ) and modulo π₯4 + 1 multiplication with a fixed polynomial 03π₯3 + 01π₯2 + 01π₯ + 02.
b0,0
b0,1
b0,2
b0,3
b0,0
b0,1
b0,2
b0,3
b1,0
b1,1
b1,2
b1,3
b1,1
b1,2
b1,3
b1,0
b2,0
b2,1
b2,2
b2,3
b2,2
b2,3
b2,0
b2,1
b3,0
b3,1
b3,2
b3,3
b3,3
b3,0
b3,1
b3,2
Figure 3: ShiftRow transformation schematic diagram.
It is assumed that the output is π·, π· = [ππ,π ], (0 β€ π, π β€ 3); then MixColumn can also be written as matrix multiplication [12β14]: π0,π 02 [ ] [ [π1,π ] [01 [ ]=[ [π ] [01 [ 2,π ] [ [π3,π ] [03
π0,π ][ ] 02 03 01] [π1,π ] ][ ]. [ ] 01 02 03] ] [π2,π ] 01 01 02] [π3,π ] 03 01 01
(4)
In the AddRoundKey transformation, the expansion round key generated by the key expansion module begins to function. Set the round key to πΎ, πΎ = [ππ,π ], (0 β€ π, π β€ 3). Set the output to πΈ, πΈ = [ππ,π ], (0 β€ π, π β€ 3). Then AddRoundKey can be expressed as a matrix: π0,π π0,π π0,π [ ] [ ] [ ] [π1,π ] [π1,π ] [π1,π ] [ ] = [ ] β [ ]. [π ] [π ] [π ] [ 2,π ] [ 2,π ] [ 2,π ] [π3,π ] [π3,π ] [π3,π ]
(5)
Equations (2), (3), and (4) into (5) can get π0,π 03 02 [ ] [ ] [ ] [02] [π1,π ] [01] [ ] = [ ] π [π0,(π+0)%4 ] β [ ] π [π1,(π+1)%4 ] [01] [π ] [01] [ ] [ 2,π ] [ ] π [01] [ 3,π ] [03] 01 01 [ ] [ ] [01] [03] [ ] ] β[ [02] π [π2,(π+2)%4 ] β [03] π [π3,(π+3)%4 ] [ ] [ ] [01]
(6)
[02]
π0,π [ ] [π1,π ] ] β[ [π ] . [ 2,π ] [π3,π ] Above we have come to a matrix representation between input π΄ and output πΈ of each round transformation of AES algorithm [15β17].
4
Journal of Electrical and Computer Engineering
4.2. Optimized AES Algorithm. In (6), to calculate 02
Start
[ 01 01 ] π[π0,(π+0)%4 ] requires one xtime [4] operation and 03
one exclusive-OR operation. Thus, getting each column vector of a round transformation result πΈ requires four xtime operations and eight exclusive-OR operations (regardless of round key generation). According to the observation we can see in the column vector multiplied by π[π0,(π+0)%4 ], π[π1,(π+1)%4 ], π[π2,(π+2)%4 ], and π[π3,(π+3)%4 ], only the three elements: 01, 02, and 03. So we can create a new π box
128-bit plaintext data
XOR operation with the extension key
02
to get directly each element in the [ 01 01 ] π[π0,(π+0)%4 ], 03
01
03 01
01
01
02
By looking up the newly constructed table to get each element of MixColumn output matrix D
03 01 [ 02 01 ] π[π1,(π+1)%4 ], [ 02 ] π[π2,(π+2)%4 ], and [ 03 ] π[π3,(π+3)%4 ]
four column vectors by look-up table method, so that we can save four xtime operations and four exclusive-OR operations and get each column vector of a round transformation result πΈ which requires only four exclusive-OR operations (regardless of round key generation). Let data in the original π box operate, respectively, with 01, 02, 03, and we get a new byte conversion table, as shown in Table 1. In the use of C language to implement, the table will be set to a two-dimensional array πnew [256][3], so that we 02
03
01
03 01
01
01
02
Every column of matrix and extension key perform exclusive OR operation
No
The number of round transformations = 9? Yes
02 can get each element of [ 01 01 ] π[π0,(π+0)%4 ], [ 01 ] π[π1,(π+1)%4 ],
128-bit encrypted data
01 [ 03 02 ] π[π2,(π+2)%4 ], and [ 03 ] π[π3,(π+3)%4 ] four column vectors 02
by look-up table method. For example, in [ 01 01 ] π[π0,(π+0)%4 ], 03
the lower four bits and higher four bits of π0,(π+0)%4 correspond separately to the abscissas and ordinates of the table, so that we get the row coordinates of the two-dimensional array, which is equivalent to determining which grid is in Table 1. The 2, 1, 1, 3 of the column vector correspond separately to the 1, 0, 0, 2 in two-dimensional array column coordinates, which is equivalent to determining which element of the grid is in Table 1. The optimized AES encryption algorithm flow chart is shown in Figure 4. Likewise, a similar new byte conversion table can be created at the time of decryption to achieve decryption optimization. 4.3. Experimental Results and Analysis. In order to test the encryption speed between classical AES algorithm and optimized AES algorithm in this paper, we use C ++ language to implement the two algorithm encryption processes, respectively, the encryption process in Windows 7 operating system, Core i5-3230M 2.60 GHz CPU, and 8 G memory environment. In each experiment we take 100,000 times the encryption time, and we get a total of 10 sets of data in five experiments. The data obtained in the experiments are shown in Table 2. Through the test results in Table 2 we can see that the encryption speed of optimized AES algorithm has a great improvement compared to the classic AES algorithm. In terms of memory footprint, this optimized AES encryption algorithm requires 256 Γ 3 Γ 2 = 1536 B = 1.5 KB to store two new byte conversion tables (encryption and decryption). The traditional AES algorithm requires 256 Γ 2 = 512 B = 0.5 KB
End
Figure 4: Optimized AES encryption algorithm flow chart.
to store two bytes conversion tables, so the optimized AES algorithm does not significantly increase the memory resource occupancy.
5. Conclusion The system implements the verification of the student identity through the fingerprint, which can make the campus life more convenient. The fingerprint data is only stored in the host computer database after encryption transmission, which makes the convenience greatly improved on the basis of ensuring security. Each terminal connected with the host computer constitutes an integral system to achieve the information sharing among each terminal, and the host computer stores the terminal data and manages the studentsβ information efficiently with less time. The encryption method based on the improved AES optimizes the implementation method of algorithm in the process of simplifying the operation step, and the mathematical structure of the original algorithm is not changed, so that the encryption speed increases rapidly under the condition that the security is not reduced, while the memory occupation does not increase significantly, so it is easy to be achieved in the embedded system. Taking an example of AES with 128-bit plaintext length and key
Journal of Electrical and Computer Engineering
5
Table 1: The byte conversion table of optimized AES algorithm.
0
1
2
3
4
5
6
7
8
9
a
b
c
d
e
f
0 63 c6 a5 ca 8f 45 b7 75 c2 04 08 0c 09 12 1b 53 a6 f5 d0 bb 6b 51 a2 f3 cd 81 4c 60 c0 a0 e0 db 3b e7 d5 32 ba 6f d5 70 e0 90 e1 d9 38 8c 03 8f
1 7c f8 84 82 1f 9d fd e1 1c c7 95 52 83 1d 9e d1 b9 68 ef c5 2a a3 5d fe 0c 18 14 81 19 98 32 64 56 c8 8b 43 78 f0 88 3e 7c 42 f8 eb 13 a1 59 f8
2 77 ee 99 c9 89 40 93 3d ae 23 46 65 2c 58 74 00 02 02 aa 4f e5 40 80 c0 13 26 35 4f 9e d1 3a 74 4e 37 6e 59 25 4a 6f b5 71 c4 98 2b b3 89 09 80
3 7b f6 8d 7d fa 87 26 4c 6a c3 9d 5e 1a 34 2e ed c1 2c fb ed 16 8f 05 8a ec c3 2f dc a3 7f 0a 14 1e 6d da b7 2e 5c 72 66 cc aa 11 22 33 0d 1a 17
4 f2 ff 0d fa ef 15 36 6c 5a 18 30 28 1b 36 2d 20 40 60 43 86 c5 92 3f ad 5f be e1 22 44 66 49 92 db 8d 01 8c 1c 38 24 48 90 d8 69 d2 bb bf 65 da
5 6b d6 bd 59 b2 eb 3f 7e 41 96 37 a1 6e dc b2 fc e3 1f 4d 9a d7 9d 21 bc 97 35 a2 2a 54 7e 06 0c 0a d5 b1 64 a6 57 f1 03 06 05 d9 a9 70 e6 d7 31
6 6f de b1 47 8e c9 f7 f5 02 05 0a 0f 5a b4 ee b1 79 c8 33 66 55 38 70 48 44 88 cc 90 3b ab 24 48 6c 4e 9c d2 b4 73 c7 f6 f7 01 8e 07 89 42 84 c6
7 5c 91 54 f0 fb 0b cc 83 4f 9a 2f b5 a0 5b fb 5b b6 ed 85 11 94 f5 f1 04 17 2e 39 88 0b 83 5c b8 e4 a9 49 e0 c6 97 51 0e 1c 12 94 33 a7 68 d0 b8
8 30 60 90 ad 41 ec 34 68 5c 07 0e 09 52 a4 f6 6a d4 be 45 8a cf bc 63 df c4 93 57 46 8c ca c2 9f 5d 6c d8 b4 e8 cb 23 61 c2 a3 9b 2d b6 41 42 c3
9 01 02 03 d4 b3 67 a5 51 f4 12 24 36 3b 76 d4 cb 8d 46 f9 e9 10 b6 77 c1 a7 55 f2 ee c7 29 d3 bd 6e 56 ac fa dd a1 7c 35 6a 5f 1e 3c 22 99 29 b0
a 67 ce a9 a2 5f fd e5 d1 34 80 1b 9b d6 b7 61 be 67 d9 02 04 06 da af 75 7e fc 82 b8 6b d3 ac 43 ef f4 f3 07 74 e8 9c 57 ae f9 87 15 92 2d 5a 77
b 2b 56 7d af 45 ea f1 f9 08 e2 df 3d b3 7d ce 39 72 4b 7f fe 81 21 24 63 3d 7a 47 14 28 3c 62 c4 a6 ea cf 25 1f 3e 21 b9 69 d0 e9 c9 20 0f 1e 11
c fe e7 19 9c 23 bf 71 e2 93 eb cd 26 29 52 7b 4a 94 de 50 a0 f0 10 20 30 64 c8 ac de a7 79 91 39 a8 65 ca af 4b 96 dd 86 17 91 ce 87 49 b0 7b cb
d d7 b5 62 a4 53 f7 d8 ab 73 27 4e 69 e3 dd 3e 4c 98 d4 3c 78 44 ff e5 1a 5d ba e7 5e bc e2 95 31 a4 7a f4 8e bd 61 dc c1 99 58 55 aa ff 54 a8 fc
e ab 4d e6 72 e4 96 31 62 53 b2 7f cd 2f 5e 71 58 b0 e8 9f 25 ba f3 fd 0e 19 32 2b 0b 16 1d e4 d3 37 ae 47 e9 8b 0d 86 1d 3a 27 28 50 78 bb 6d d6
f 76 ec 9a c0 9b 5b 15 2a 3f 75 ea 9f 84 13 97 cf 85 4a a8 4b e3 d2 bf 6d 73 e6 95 db ad 76 79 f2 8b 08 10 18 8a 0f 85 9e 27 b9 df a5 7a 16 2c 3a
Table 2: Experimental test results. The algorithm used Traditional AES algorithm Optimized AES algorithm
1
2
Experiment number 3
8.472 1.550
8.443 1.471
8.382 1.471
4
5
The average time of 100,000 times encryption (s)
8.427 1.469
8.430 1.533
8.43 1.50
6 length, this paper proposes an optimization scheme based on actual requirement. The scheme can also be extended to the AES with other data lengths, which is suitable for various situations of data encryption, so it has a wide range of applications and strong practicability.
Conflicts of Interest The authors declare that there are no conflicts of interest regarding the publication of this paper.
Acknowledgments Special thanks are due to National University Student Innovation Program and Nankai University for the assistance provided to this project.
References [1] Z. Kai, βDesign and implementation of college studentsβ entrepreneurship management system based on B/S structure,β RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao, vol. 2016, no. 17, pp. 102β113, 2016. [2] S. R. Bharamagoudar, R. B. Geeta, and S. G. Totad, βWeb based student information management system,β International Journal of Advanced Research in Computer and Communication Engineering, vol. 2, no. 6, 2013. [3] R. Ahmad and W. Ismail, βPerformance comparison of advanced encryption standard-128 algorithms for wimax application with improved power-throughput,β Journal of Engineering Science and Technology, vol. 11, no. 12, pp. 1678β1694, 2016. [4] J. Daor, J. Daemen, and V. Rijmen, βAes proposal: rijndael. Vazirani, efficient and secure pseudo-random number generation,β in Proceedings of the 25th IEEE FOCS, 1999. [5] STMicroelectronics, STM32 Reference Manual, 10th edition, 2009. [6] US Department of Commerce and NIST, βAdvanced Encryption Standard,β in Proceedings of the National Computer Conference, pp. 83β87, 2006. [7] R. Ahmad and W. Ismail, βA survey of high performance cryptography algorithms for WiMAX applications using SDR,β Self-Organization and Green Applications in Cognitive Radio Networks, pp. 231β246, 2013. [8] C. Monteiro, Y. Takahashi, and T. Sekine, βLow-power secure Sbox circuit using charge-sharing symmetric adiabatic logic for advanced encryption standard hardware design,β IET Circuits, Devices and Systems, vol. 9, no. 5, pp. 362β369, 2015. [9] A. M. Youssef and S. E. Tavares, βAffine equivalence in the AES round function,β Discrete Applied Mathematics, vol. 148, no. 2, pp. 161β170, 2005. [10] G. Bertoni, L. Breveglieri, I. Koren, P. Maistri, and V. Piuri, βError analysis and detection procedures for a hardware implementation of the advanced encryption standard,β IEEE Transactions on Computers, vol. 52, no. 4, pp. 492β505, 2003. [11] J. BlΒ¨omer and J. P. Seifert, βFault Based Cryptanalysis of the Advanced Encryption Standard (AES),β in Proceedings of the Financial Cryptography, International Conference, FC 2003, vol. 2742, pp. 162β181, DBLP, Guadeloupe, French West Indies, France, 2003.
Journal of Electrical and Computer Engineering [12] J. Daemen and V. Rijmen, The Design of Rijndael: AES-The Advanced Encryption Standard, Springer, Berlin, Germany, 2002. [13] B. Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C, Wiley Publishing, Indianapolis, IN, USA, 2015. [14] W. Stallings, Cryptography and Network Security: Principles and Practice, 1999. [15] M. McLoone and J. V. McCanny, βRijndael FPGA implementation utilizing look-up tables,β in Proceedings of the IEEE Workshop on Signal Processing Systems-Design and Implementation(SIPS) 2001, pp. 349β360, October 2001. [16] J. Gong, W. Liu, and H. Zhang, βMultiple lookup table-based aes encryption algorithm implementation,β Physics Procedia, vol. 25, pp. 842β847, 2012. [17] J.-F. Wang, S.-W. Chang, and P.-C. Lin, βA novel round function architecture for AES encryption/decryption utilizing look-up table,β in Proceedings of the 37th Annual 2003 International Carnahan Conference on Security Technology, pp. 132β136, October 2003.
International Journal of
Rotating Machinery
(QJLQHHULQJ Journal of
Hindawi Publishing Corporation http://www.hindawi.com
Volume 201
The Scientific World Journal Hindawi Publishing Corporation http://www.hindawi.com
Volume 2014
International Journal of
Distributed Sensor Networks
Journal of
Sensors Hindawi Publishing Corporation http://www.hindawi.com
Volume 2014
Hindawi Publishing Corporation http://www.hindawi.com
Volume 2014
Hindawi Publishing Corporation http://www.hindawi.com
Volume 2014
Journal of
Control Science and Engineering
Advances in
Civil Engineering Hindawi Publishing Corporation http://www.hindawi.com
Hindawi Publishing Corporation http://www.hindawi.com
Volume 2014
Volume 2014
Submit your manuscripts at https://www.hindawi.com Journal of
Journal of
Electrical and Computer Engineering
Robotics Hindawi Publishing Corporation http://www.hindawi.com
Hindawi Publishing Corporation http://www.hindawi.com
Volume 2014
Volume 2014
VLSI Design Advances in OptoElectronics
International Journal of
Navigation and Observation Hindawi Publishing Corporation http://www.hindawi.com
Volume 2014
Hindawi Publishing Corporation http://www.hindawi.com
Hindawi Publishing Corporation http://www.hindawi.com
Chemical Engineering Hindawi Publishing Corporation http://www.hindawi.com
Volume 2014
Volume 2014
Active and Passive Electronic Components
Antennas and Propagation Hindawi Publishing Corporation http://www.hindawi.com
$HURVSDFH (QJLQHHULQJ
Hindawi Publishing Corporation http://www.hindawi.com
Volume 2014
+LQGDZL3XEOLVKLQJ&RUSRUDWLRQ KWWSZZZKLQGDZLFRP
9ROXPH
Volume 201-
International Journal of
International Journal of
,QWHUQDWLRQDO-RXUQDORI
Modelling & Simulation in Engineering
Volume 2014
Hindawi Publishing Corporation http://www.hindawi.com
Volume 2014
Shock and Vibration Hindawi Publishing Corporation http://www.hindawi.com
Volume 2014
Advances in
Acoustics and Vibration Hindawi Publishing Corporation http://www.hindawi.com
Volume 2014