Skip to main content

Using voice to generate cryptographic keys

Publication ,  Conference
Monrose, F; Reiter, MK; Li, Q; Wetzel, S
Published in: 2001: A Speaker Odyssey - The Speaker Recognition Workshop
January 1, 2001

In this position paper, we motivate and summarize our work on repeatably generating cryptographic keys from spoken user input. The goal of this work is to enable a device to generate a key (e.g., for encrypting files) upon its user speaking a chosen password (or passphrase) to it. An attacker who captures the device and extracts all information it contains, however, should be unable to determine this key. We outline our approach for achieving this goal and present preliminary empirical results for it. We also describe several directions for future work.

Duke Scholars

Published In

2001: A Speaker Odyssey - The Speaker Recognition Workshop

Publication Date

January 1, 2001

Start / End Page

237 / 242
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Monrose, F., Reiter, M. K., Li, Q., & Wetzel, S. (2001). Using voice to generate cryptographic keys. In 2001: A Speaker Odyssey - The Speaker Recognition Workshop (pp. 237–242).
Monrose, F., M. K. Reiter, Q. Li, and S. Wetzel. “Using voice to generate cryptographic keys.” In 2001: A Speaker Odyssey - The Speaker Recognition Workshop, 237–42, 2001.
Monrose F, Reiter MK, Li Q, Wetzel S. Using voice to generate cryptographic keys. In: 2001: A Speaker Odyssey - The Speaker Recognition Workshop. 2001. p. 237–42.
Monrose, F., et al. “Using voice to generate cryptographic keys.” 2001: A Speaker Odyssey - The Speaker Recognition Workshop, 2001, pp. 237–42.
Monrose F, Reiter MK, Li Q, Wetzel S. Using voice to generate cryptographic keys. 2001: A Speaker Odyssey - The Speaker Recognition Workshop. 2001. p. 237–242.

Published In

2001: A Speaker Odyssey - The Speaker Recognition Workshop

Publication Date

January 1, 2001

Start / End Page

237 / 242