Computer Science – Cryptography and Security
Scientific paper
2008-04-11
Computer Science
Cryptography and Security
6 pages, 3 figures
Scientific paper
In this note we propose an encryption communication protocol which also provides database security. For the encryption of the data communication we use a transformation similar to the Cubic Public-key transformation. This method represents a many-to-one mapping which increases the complexity for any brute force attack. Some interesting properties of the transformation are also included which are basic in the authentication protocol.
No associations
LandOfFree
A Security Protocol for Multi-User Authentication does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with A Security Protocol for Multi-User Authentication, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and A Security Protocol for Multi-User Authentication will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-473908