Cryptography is a mathematical technique that plays an important role in information security techniques for addressing authentication, interactive proofs, data origination, sender/receiver identity, non-repudiation, secure computation, data integrity and confidentiality, message integrity checking and digital signatures. In public key cryptography, the security of private keys is very importance, for if ever compromised, it can be used to decrypt secret messages. Conventional methods that use textual passwords, graphical passwords and single modal biometric systems that are used to encryption and protect private keys do not provide adequate security due to uses password practices and the very low entropy of chosen passwords. To improve the...
In traditional cryptosystems, user authentication is based on possession of secret keys/tokens. Suc...
M.Sc. (Computer Science)Since the emergence of electronic communication, scientists have strived to ...
Copyright © 2015 ISSR Journals. This is an open access article distributed under the Creative Common...
Cryptography is the science of encrypting the information so that it is rendered unreadable for an i...
Emerging applications like electronic commerce and secure communications over open networks have mad...
Data is of all sorts, ranging from all pertaining entertainment to national defense. There is a high...
The desire to transmit messages securely is not new. For centuries, community kept communication in ...
This paper proposes a new method for generating symmetric keys. The keys are based on a co-operative...
Exchanging cryptographic keys has been a problem with respect to security. Whitfield Diffie and Mart...
The proposed paper present new algorithm for generate complex key or complex password that can be us...
Abstract- In today‟s computer world security, integrity, confidentiality of the organization‟s data ...
ABSTRUCT: There are many aspects to security and many applications, ranging from secure commerce and...
In modern day technology, the Information Society is at risk. Passwords are a multi-user computer sy...
The increasingly distributed nature of many current and future technologies has introduced many chal...
In order to check the applicability and correctness of any designed algorithm, it is must to write a...
In traditional cryptosystems, user authentication is based on possession of secret keys/tokens. Suc...
M.Sc. (Computer Science)Since the emergence of electronic communication, scientists have strived to ...
Copyright © 2015 ISSR Journals. This is an open access article distributed under the Creative Common...
Cryptography is the science of encrypting the information so that it is rendered unreadable for an i...
Emerging applications like electronic commerce and secure communications over open networks have mad...
Data is of all sorts, ranging from all pertaining entertainment to national defense. There is a high...
The desire to transmit messages securely is not new. For centuries, community kept communication in ...
This paper proposes a new method for generating symmetric keys. The keys are based on a co-operative...
Exchanging cryptographic keys has been a problem with respect to security. Whitfield Diffie and Mart...
The proposed paper present new algorithm for generate complex key or complex password that can be us...
Abstract- In today‟s computer world security, integrity, confidentiality of the organization‟s data ...
ABSTRUCT: There are many aspects to security and many applications, ranging from secure commerce and...
In modern day technology, the Information Society is at risk. Passwords are a multi-user computer sy...
The increasingly distributed nature of many current and future technologies has introduced many chal...
In order to check the applicability and correctness of any designed algorithm, it is must to write a...
In traditional cryptosystems, user authentication is based on possession of secret keys/tokens. Suc...
M.Sc. (Computer Science)Since the emergence of electronic communication, scientists have strived to ...
Copyright © 2015 ISSR Journals. This is an open access article distributed under the Creative Common...