Implementation of Euclidean Algorithm for Single Key Authentication System

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and Implementation of a Novel Authentication Algorithm for Fool-Proof Lock-Key System Based On Visual Secret Sharing Scheme

The paper aims at creating an authentication algorithm using visual cryptography that creates a fool-proof lock-key mechanism wherein a lock can be opened by its paired key only and the key cannot be duplicated. In our proposed mechanism we uses a lock and a key, both is one part of given secret image. Every lock-key pair has one associated unique image. The lock is just like a safe door which ...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

Authentication and Key Distribution System

This paper describes KryptoKnight, an authentication and key distribution system that provides facilities for secure communication in any type of network environment. KryptoKnight was designed with the goal of providing network security services with a high degree of com-pactness and exibility. Message compactness of KryptoKnight's protocols allows it to secure communication protocols at any la...

متن کامل

Face Authentication using Euclidean Distance Model with PSO Algorithm

In recent technological world lot of devices are invented. Moreover the focused topic is on security system. Even with lot of security system like finger print based, eye-retina based, pin-code based systems are available, face recognition based security system has vital role of advanced technology. Feature based Face authentication requires feature extraction, feature selection and classificat...

متن کامل

Summary of Cryptographic Authentication Algorithm Implementation Requirements for Routing Protocols

The routing protocols Open Shortest Path First version 2 (OSPFv2), Intermediate System to Intermediate System (IS-IS), and Routing Information Protocol (RIP) currently define cleartext and MD5 (Message Digest 5) methods for authenticating protocol packets. Recently, effort has been made to add support for the SHA (Secure Hash Algorithm) family of hash functions for the purpose of authenticating...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: SMCC Higher Education Research Journal

سال: 2019

ISSN: 2508-0539,2508-0547

DOI: 10.18868/ccs.02.060120.05