Methods For Authenticating Keys
نویسنده
چکیده
With the evolution of the business world from a paper-based to an electronic environment, security has taken an even more prominent role than ever before. Whether bank transactions are being encrypted or emails being protected, a business must have faith in the underlying technology infrastructure and must have the strongest belief that its information is safe from adversaries of any kind. Through the development of information security it is possible to achieve this goal. However as we will see in this report, the solution is not a simple one and many factors must firstly be taken into consideration.
منابع مشابه
Using a Variation of Elgamal Signature to Support Fast and Lazy Authenticating Origin Autonomous Systems
About the schemes for authenticating origin autonomous systems, related documents think it is appropriate to authenticate address attestations and related public keys only using the information of update messages. However, this approach is infeasible in existing schemes because update messages are limited in length to 4096 bytes and thus are too small to carry the necessary public key certifica...
متن کاملProcess algebraic modeling of authentication protocols for analysis of parallel multi-session executions
Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...
متن کاملAuthenticating ‘Cover to Cover’ Reader Series vis-à-vis Cultural Norms for the Iranian community
This research study was an attempt to explore hidden cultural components in an ELT textbook from Oxford University Press (OUP) titled 'Cover to Cover'. Two research methodologies were relied on to unveil the western ideologies in this series: Firstly, a qualitative review over its reading textbooks was undertaken for authenticating the hidden western values for Iranian contexts. At this stage, ...
متن کاملPrototyping a Lightweight Trust Architecture to Fight Phishing
LTA is a lightweight trust architecture that fights phishing attacks by authenticating e-mail messages. LTA uses separable identity-based ring signatures, which are more attractive than traditional digital signatures for e-mail signing. Because the signatures are identity-based, users do not need to generate keys ahead of time. And because the ring signatures are repudiable, users do not need t...
متن کاملSecurity Efficiency Analysis of a Biometric Fuzzy Extractor for Iris Templates
A Biometric fuzzy extractor scheme for iris templates was recently presented in [3]. This fuzzy extractor binds a cryptographic key with the iris template of a user, allowing to recover such cryptographic key by authenticating the user by means of a new iris template from her. In this work, an analysis of the security efficiency of this fuzzy extractor is carried out by means of a study about t...
متن کامل