Skip to main content

Toward speech-generated cryptographic keys on resource constrained devices

Publication ,  Conference
Monrose, F; Reiter, MK; Li, Q; Lopresti, DP; Shih, C
Published in: Proceedings of the 11th USENIX Security Symposium
January 1, 2002

Programmable mobile phones and personal digital assistants (PDAS) with microphones permit voice-driven user interfaces in which a user provides input by speaking. In this paper, we show how to exploit this capability to generate cryptographic keys on such devices. Specifically, we detail our implementation of a technique to generate a repeatable cryptographic key on a PDA from a spoken passphrase. Rather than deriving the cryptographic key from merely the passphrase that was spoken—which would constitute little more than an exercise in automatic speech recognition—we strive to generate a substantially stronger cryptographic key with entropy drawn both from the passphrase spoken and how the user speaks it. Moreover, the cryptographic key is designed to resist cryptanalysis even by an attacker who captures and reverse-engineers the device on which this key is generated. We describe the major hurdles of achieving this on an off-the-shelf PDA bearing a 206 MHZ StrongArm CPU and an inexpensive microphone. We also evaluate our approach using multiple data sets, one recorded on the device itself, to clarify the effectiveness of our implementation against various attackers.

Duke Scholars

Published In

Proceedings of the 11th USENIX Security Symposium

Publication Date

January 1, 2002
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Monrose, F., Reiter, M. K., Li, Q., Lopresti, D. P., & Shih, C. (2002). Toward speech-generated cryptographic keys on resource constrained devices. In Proceedings of the 11th USENIX Security Symposium.
Monrose, F., M. K. Reiter, Q. Li, D. P. Lopresti, and C. Shih. “Toward speech-generated cryptographic keys on resource constrained devices.” In Proceedings of the 11th USENIX Security Symposium, 2002.
Monrose F, Reiter MK, Li Q, Lopresti DP, Shih C. Toward speech-generated cryptographic keys on resource constrained devices. In: Proceedings of the 11th USENIX Security Symposium. 2002.
Monrose, F., et al. “Toward speech-generated cryptographic keys on resource constrained devices.” Proceedings of the 11th USENIX Security Symposium, 2002.
Monrose F, Reiter MK, Li Q, Lopresti DP, Shih C. Toward speech-generated cryptographic keys on resource constrained devices. Proceedings of the 11th USENIX Security Symposium. 2002.

Published In

Proceedings of the 11th USENIX Security Symposium

Publication Date

January 1, 2002