Cryptography is one of the important sciences in the current era. The importance of cryptography comes from the intensive digital transactions which we daily perform on the internet and other communication channels. I...
详细信息
ISBN:
(纸本)9781467308946
Cryptography is one of the important sciences in the current era. The importance of cryptography comes from the intensive digital transactions which we daily perform on the internet and other communication channels. In this paper, we will discuss the relationship between cryptography and mathematics in the context of Elliptic Curve (EC). ECs are mathematical NP-hard problems, which are proofed to be intractable in term of complexity. Cryptography has efficiently utilized the strength EC in developing several cryptosystems such as key agreement protocols, digital signatures and others. Elliptic Curve Cryptography (ECC) usage is with smaller key to give high security and high speed in a low bandwidth. ECC is considered as the best method for upcoming applications. This paper presents the idea of biometric signature - a new method to combine biometrics with public key infrastructure (PKI), the security can be increased using the ECC in biometric signature creation, because the private and public keys are produced without saving and sending any secret information anywhere.
Cloud computing becomes one of the important part of the IT-enterprise. It delivers computing application, software, hardware and computing resources to the user. So many user gets connected to the cloud because of th...
详细信息
ISBN:
(纸本)9781538652589;9781538652572
Cloud computing becomes one of the important part of the IT-enterprise. It delivers computing application, software, hardware and computing resources to the user. So many user gets connected to the cloud because of the facility it provided. In this, user pays only for the services it uses. Now a days, vast amount of information gets stored over cloud, which include personal file, images, pdf, text, multimedia data etc. So security becomes one of the important issue. Everyone just want to upload, store its data without worrying about the security. IT organization should look after to provide security to the document. Documents content get altered by some outsider attacker, so it is necessary to verify the integrity. This data get duplicated and unnecessary much of the space will get waste. So to avoid this, data must be de-duplicated and uploaded over the cloud server. For this secure hash algorithm is used. It calculates the hash value for chunk of data and store over cloud. Only reducing unnecessary wastage of space is not the solution administrator should look toward the security issue. TPA is used for verification of integrity of the document. This system is proposed for achieving this both issues.
暂无评论