A Robust Cryptographic System using Neighborhood-Generated Keys
نویسندگان
چکیده
منابع مشابه
A Robust Cryptographic System using Neighborhood-Generated Keys
The ability to hide information from unauthorized individuals has been a prevalent issue over the years. Countless algorithms such as DES, AES and SHA have been developed. These algorithms depend on varying key length and key management strategies to encrypt and decrypt messages. The size of the encrypted message is so large that it therefore consumes and wastes valuable storage space when impl...
متن کاملToward Speech-Generated Cryptographic Keys on Resource-Constrained Devices
Voice signal Goals Cryptographic key for cryptographic applications Main criteria • Key (re)generation for user should be reliable and efficient on resource-constrained devices • Key search should be difficult for attacker, even with captured device
متن کاملUsing voice to generate cryptographic keys
In this position paper, we motivate and summarize our work on repeatably generating cryptographic keys from spoken user input. The goal of this work is to enable a device to generate a key (e.g., for encrypting files) upon its user speaking a chosen password (or passphrase) to it. An attacker who captures the device and extracts all information it contains, however, should be unable to determin...
متن کاملSafeguarding cryptographic keys
Certain cryptographic keys, such as a number which makes it possible to compute the secret decoding exponent in an RSA public key cryptosystem,1,5 or the system master key and certain other keys in a DES cryptosystem,3 are so important that they present a dilemma. If too many copies are distributed one might go astray. If too few copies are made they might all be destroyed. A typical cryptosyst...
متن کاملA schema for Cryptographic Keys generation using Hybrid Biometrics
Biometric identifiers refer to unique physical properties or behavioral attributes of individuals. Some of the well known biometric identifiers are voice, finger prints, retina or iris, facial structure etc. In our daily interaction with others directly or indirectly, we implicitly use biometrics to know, distinguish and trust people. Biometric identifiers represent the concept of “who a person...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Research in Computer Science
سال: 2012
ISSN: 2249-8257,2249-8265
DOI: 10.7815/ijorcs.25.2012.041