With growing demand to secure data and information, there have been advancements around the authentication mechanisms including biometric authentication, secure access token and also MFA or multi-factor authentication. One of the research papers had mentioned the use of cognitive models as an authentication mechanism which will add an effective layer of encryption. This post is a review and presentation of how cognitive models or patterns can also be effectively implemented as another layer of security blanket.
In relevance to cognitive cryptography, this new field has been believed to have two major applications. The first application is about crypto-biometric solutions whereas the other one is about cognitive approach for data security and data transmission. The use of personal information for the encryption process has been highlighted throughout the paper. Hence the term cognitive cryptography has been coined.
Cryptography is undoubtedly one of the most important factors to be considered for an effective security and to safeguard data. With time, different methods have been deployed and newer techniques are replacing the traditional methods of protecting data. The use of random keys has been replaced so as to make use of personalized keys for data encryption. The significance of cognitive cryptography has majorly been focused for three reasons:
a) The need to share information amongst authorized individuals.
b) During the authentication of parties or users.
c) Involving encryption using biometric patterns.
The above mentioned reasons arises the need to have cryptographic algorithms to be more personalized. It is also to be noted with increase of cyber attacks it has become paramount to be more aware and be updated with the latest trends around the various cyber crimes. The significance of crypto-biometric systems evolving to function on different personal patterns is definitely a factor that needs to be considered. In order for the implementation of cognitive cryptography, the use of cognitive information systems has been advised for extracting specific information features from patterns which can be used as a key.
The applications could be connected with visual cryptography and steganography, data sharing and personalised cryptography. As far as the application of cognitive cryptography for visual cryptography and steganography, it has depicted the use of visual perception thresholds assigned to particular participants of the sharing protocol. Such an application is aimed at creating secret schemes, when combined together would allow to recombine the image into an observable form for the specified person.
It is a brilliant notion put forward but needs a lot of research to make this field more usable since it does give the end user to make use of personalized biometrics to encrypt the information. Though such technologies have gained some importance in the research committee, the implementation seems a bit far fetched. My personal opinion around such a cryptographic mechanism is undoutedly something which should and will be implemented in the near future and will provide a bit more effective security than the existing models.