A digital certificate under Public Key Infrastructure has a defect of Man-in-the-Middle Attack that performs hash collision attacks. In this paper, we propose a robust biometric-PKI authentication system against Man-in-the-Middle Attack. The biometric-PKI authentication system consists of current PKI authentication and biometric authentication, which employs biometric data and a public key from a digital certificate. In the proposed biometric-PKI authentication system, an au- thentication process performs that it extracts consistent features of fingerprint images, encrypts consistent features, and matches features with prepared templates. The simulation results of the proposed authentication system prove that our system achieves low false acceptance rate and high accuracy rate.
 Adams, C. and Farrell, S. (1999) Internet X.509 Public Key Infrastructure Certificate Management Protocols. RFC 2510 (Proposed Standard). http://www.ietf.org/rfc/rfc2510.txt
 Schaad, J. (2005) Internet X.509 Public Key In-frastructure Certificate Request Message Format (CRMF). RFC 4211 (Proposed Standard). http://www.ietf.org/rfc/rfc4211.txt
 Althobaiti, O.S. and Aboalsamh, H.A. (2012) An Enhanced Elliptic curve Cryptography for Biometric. Proceedings of the 7th International Conference on Computing and Convergence Technology, Seoul, 3-5 December 2012, 1048-1055.
 Scheirer, W., Bishop, B. and Boult, T. (2010) Beyond PKI: The Biocryptographic Key Infrastructure. Proceedings of the IEEE International Workshop on Information Forensics and Security, Seattle, 12-15 December 2010, 1-6. http://dx.doi.org/10.1109/WIFS.2010.5711435
 Jain, A., Prabhakar, S., Hong, L. and Pankanti, S. (2000) Filter-bank-Based Fingerprint Matching. IEEE Transactions on Image Processing, 9, 846-859. http://dx.doi.org/10.1109/83.841531
 Jain, A., Hong, L. and Bolle, R. (1997) On-Line Fingerprint Verification. IEEE Transactions on Pattern Analysis and Machine Intelligence, 19, 302-314. http://dx.doi.org/10.1109/34.587996
 Rao, A.R. (1990) A Taxonomy for Texture Description and Identification. Springer, New York. http://dx.doi.org/10.1007/978-1-4613-9777-9
 Hong, L., Wan, Y. and Jain, A.K. (1998) Fingerprint Image Enhancement: Algorithm and Performance Evaluation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 20, 777-789. http://dx.doi.org/10.1109/34.709565
 Maltoni, D., Maio, D., Jain, A.K. and Prabhakar, S. (2009) Handbook of Fingerprint Recognition. 2nd Edition, Springer, London. http://dx.doi.org/10.1007/978-1-84882-254-2
 Sotirov, A., et al. (2008) Creating a Rogue CA Certificate. http://www.tue.nl/hashclash/rogue-ca/
 Maio, D., Maltoni, D., Cappelli, R. and Wayman, J.L. (2002) FVC2002: Second Fingerprint Verification Competition. Proceedings of the 16th International Conference on Pattern Recognition, 3, 811-814. http://dx.doi.org/10.1109/ICPR.2002.1048144