Two layered Secure Password Generation with Random Number Generator
نویسندگان
چکیده
منابع مشابه
SPICE Simulation of a "Provably Secure" True Random Number Generator
In their paper “A Provably Secure True Random Number Generator with Built-in Tolerance to Active Attacks”, B. Sunar, W. Martin, and D. Stinson propose a design for a true random number generator. Using SPICE simulation we study the behaviour of their random number generator and show that practical implementations result in a too high frequency signal to be processed with current CMOS technology.
متن کاملRandom Number Generator Recommendation
The generation of uniform pseudo-random numbers between 0 and 1 is important in many numerical simulations. The purpose of this report is to explore the best generator(s) of such random numbers in terms of statistical properties and speed. While attempting to find the best generator in general, the specific goal of this report is to find the best generator for Latin hypercube sampling [Iman and...
متن کاملLinux Random Number Generator
The venerable Linux /dev/random served users of cryptographic mechanisms well for a long time. Its behavior is well understood to deliver entropic data. In the last years, however, the Linux /dev/random showed signs of age where it has challenges to cope with modern computing environments ranging from tiny embedded systems, over new hardware resources such as SSDs, up to massive parallel system...
متن کاملRandom number generator
A random number generator (often abbreviated as RNG) is a computational or physical device designed to generate a sequence of numbers or symbols that lack any pattern, i.e. appear random. Computer-based systems for random number generation are widely used, but often fall short of this goal, though they may meet some statistical tests for randomness intended to ensure that they do not have any e...
متن کاملNumber Theoretic Attacks on Secure Password Schemes
Encrypted Key Exchange (EKE) [1, 2] allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secret key cryptography. EKE promises security against active attacks and dictionary attacks. Other secure protocols have been proposed based on the use of randomized
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Korea Institute of Information and Communication Engineering
سال: 2014
ISSN: 2234-4772
DOI: 10.6109/jkiice.2014.18.4.867