scholarly journals A Two-Fold Authentication Mechanism for Network Security

2018 ◽  
Vol 7 (2) ◽  
pp. 86-90
Author(s):  
D. Selvamani ◽  
V. Selvi

Security is very important90 for any kind of networks. As a main communication mode, the security mechanism for multicast is not only the measure to ensure secured communications, but also the precondition for other security services. Attacks are one of the biggest concerns for security professionals. Attackers usually gain access to a large number of computers by exploiting their vulnerabilities to set up attack armies. This paper presents a double way authentication mechanism which uses the functionality of Elliptical Curve Cryptography, Kerberos System and RSA algorithm. ECC algorithm utilized to encrypt the user information whereas RSA used to encrypt the secret key itself to ensure the more security in the networks.

2019 ◽  
Vol 8 (3) ◽  
pp. 3614-3619

Security is essential for any networks. As the essential communication mode, the security mechanism for multicast isn't just the measure to guarantee verified communications, yet additionally the precondition for other security services. Attacks are one of the most significant worries for security experts. Attackers more often than not access an enormous number of computers by misusing their vulnerabilities to set up attack armed forces. This paper shows a twofold way validation mechanism which uses the usefulness of Elliptical Curve Cryptography, Kerberos System, and ElGamal algorithm. ECC algorithm used to encrypt the user information, whereas ElGamal used to encrypt the secret key itself to ensure more security in the networks.


2018 ◽  
Vol 7 (4.10) ◽  
pp. 295
Author(s):  
Murali S ◽  
Manimaran A ◽  
Selvakumar K ◽  
Dinesh Kumar S

The secured web-based voting framework is the need of the present time. We propose another secure authentication for the online voting framework by utilizing face recognition and hashing algorithm. A simple verification process is accomplished during the initial registration process via email and phone. The voter is asked to give a unique identification number (UIN) provided by the election authority and face image at the time of main registration. This UIN is converted into a secret key using the SHA algorithm. The face image that is saved in the Amazon web service (AWS) acts as an authentication mechanism which enables people to cast their vote secretly. The voters, who cast numerous votes amid the way toward voting is guaranteed to be counteracted by encrypted UIN.  The election organizers can see the election parallelly as the voting is saved in the real-time database. The privacy of the voter is maintained as the details are converted into the key. In this system, an individual can vote from outside of his/her allocated constituency.  


2020 ◽  
Vol 8 (4) ◽  
pp. 475
Author(s):  
Maria Okta Safira ◽  
I Komang Ari Mogi

In this paper two methods are used, namely the vigenere cipher method and the RSA method. The vigenere cipher method is an example of a symmetric algorithm, while RSA is an example of an asymmetric algorithm. The combination of these two methods is called hybrid cryptography which has the advantage in terms of speed during the encryption process. Each process, which is encryption and decryption, is carried out twice, so that security can be ensured. In the process of forming the key used the RSA method. In the encryption process using public keys that have been generated before when the key is formed. This public key is used in sending data to the recipient of a secret message where this key is used for the data encryption process. The Secret key is kept and will be used during the decryption process. There is a system architecture that describes how clients and servers communicate with each other over the internet using the TCP protocol where the client here is an IoT device and the server is a server. 


Author(s):  
Daya Sagar Gupta ◽  
G. P. Biswas

In this chapter, a cloud security mechanism is described in which the computation (addition) of messages securely stored on the cloud is possible. Any user encrypts the secret message using the receiver's public key and stores it. Later on, whenever the stored message is required by an authentic user, he retrieves the encrypted message and decrypts it by using his secret key. However, he can also request the cloud for an addition of encrypted messages. The cloud system only computes the requested addition and sends it to the authentic user; it cannot decrypt the stored encrypted messages on its own. This addition of encrypted messages should be the same as the encryption of the addition of original messages. In this chapter, the authors propose a homomorphic encryption technique in which the above-discussed scenario is possible. The cloud securely computes the addition of the encrypted messages which is ultimately the encryption of the addition of the original messages. The security of the proposed encryption technique depends on the hardness of elliptic curve hard problems.


Author(s):  
Youssef Gahi ◽  
Imane El Alaoui ◽  
Mouhcine Guennoun

Database-as-a-service (DBaaS) is a trend allowing organizations to outsource their databases and computations to external parties. However, despite the many advantages provided by this service in terms of cost reduction and efficiency, DBaaS raises many security issues regarding data privacy and access control. The protection of privacy has been addressed by several research contributions proposing efficient solutions such as encrypted databases and blind queries over encrypted data, called blind processing. In this latter context, almost all proposed schemes consider an architecture of a single user (the data owner) that requests the database server for encrypted records while he is the only one capable of decrypting. From a practical perspective, a database system is set up to support not only a single user but multiple users initiating multiple queries. However, managing various accesses to an encrypted database introduces several challenges by itself, like key sharing, key revocation, and data re-encryption. In this article, we propose a simple and efficient blind processing protocol that allows multiple users to query the same encrypted data and decrypt the retrieved results without getting access to the secret key.


2014 ◽  
Vol 926-930 ◽  
pp. 2434-2437
Author(s):  
Jin Meng ◽  
Yu Yang Du ◽  
Xiao Zhang

IPV6 is the next generation networking protocol. It can provide more address space than IPV4 and more secure service. This paper studies the technical features of the IPv6 protocol, discusses IPv6 network security mechanisms.


Sign in / Sign up

Export Citation Format

Share Document