This article is devoted to the hash function that provides closure of biometrics in information networks for remote access to client account. There is proposed hash function which is described as a table of numbers. Verification of sustainability of cryptographic hash functions is performed. The session key for the hash is determined by the sequence of biometric data. The protocol of mutual authentication of a client and the server of payment system is given. The number of client’s safe applications to ATM is estimated.
1. Mrunal Fatangare, Honwadkar K. N. A Biometric Solution to Cryptographic Key Management Problem using Iris based Fuzzy Vault / International Journal of Computer Applications (0975 – 8887) Volume 15– No.5, February 2011 – p.42 – 46.2. Standard ISO/IEC 24745:2011, Information technology – Security techniques – Biometric information protection. 3. Second report on card fraud Jule 2013 [electronic resource]: - Access: http://www.paymentscardsandmobile.com/wp-content/uploads/2013/08/ ECB_Card-Fraud-Report-2013-07en.pdf - ISBN 978-92-899-1013-2 (online). 4. Third report on card fraud February 2014 [electronic resource]: – Access: http://www.ecb.europa.eu/pub/pdf/other/ cardfraudreport201402en.pdf – ISBN 978-92 -899-1253-2 (online). 5. Требования о защите информации, не составляющей государственную тайну, содержащейся в государственных инфор- мационных системах; [electronic resource]: – Access: http://pro-spo.ru/personal-data-security/ 4040-trebovaniya-o-zashhite-informaczii-ne-sostavlyayushhej-gosudarstvennuyu-tajnu-soderzhashhejsyav-gosudarstvennyx-informaczionnyx -sistemax (online). 6. Privat service launched Sound Authorization User is privat24, 25/04 2014, [electronic resource]: Access: http://kbs-izdat.com/privatbank-zapustilservis-zvukovoj-avtorizacii-polz... (online).