A Robust Cryptographic System using Neighborhood-Generated Keys

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Robust Cryptographic System using Neighborhood-Generated Keys

The ability to hide information from unauthorized individuals has been a prevalent issue over the years. Countless algorithms such as DES, AES and SHA have been developed. These algorithms depend on varying key length and key management strategies to encrypt and decrypt messages. The size of the encrypted message is so large that it therefore consumes and wastes valuable storage space when impl...

متن کامل

Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices

Voice signal Goals Cryptographic key for cryptographic applications Main criteria • Key (re)generation for user should be reliable and efficient on resource-constrained devices • Key search should be difficult for attacker, even with captured device

متن کامل

Using voice to generate cryptographic keys

In this position paper, we motivate and summarize our work on repeatably generating cryptographic keys from spoken user input. The goal of this work is to enable a device to generate a key (e.g., for encrypting files) upon its user speaking a chosen password (or passphrase) to it. An attacker who captures the device and extracts all information it contains, however, should be unable to determin...

متن کامل

Safeguarding cryptographic keys

Certain cryptographic keys, such as a number which makes it possible to compute the secret decoding exponent in an RSA public key cryptosystem,1,5 or the system master key and certain other keys in a DES cryptosystem,3 are so important that they present a dilemma. If too many copies are distributed one might go astray. If too few copies are made they might all be destroyed. A typical cryptosyst...

متن کامل

A schema for Cryptographic Keys generation using Hybrid Biometrics

Biometric identifiers refer to unique physical properties or behavioral attributes of individuals. Some of the well known biometric identifiers are voice, finger prints, retina or iris, facial structure etc. In our daily interaction with others directly or indirectly, we implicitly use biometrics to know, distinguish and trust people. Biometric identifiers represent the concept of “who a person...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Research in Computer Science

سال: 2012

ISSN: 2249-8257,2249-8265

DOI: 10.7815/ijorcs.25.2012.041