Second Level Password Generator
Password gives user access to the university computing services. Every time the user connects, he or she must provide the magic word; he must prove he is who he says he is. The intruder with the necessary knowledge, experience, and tools gains entry to a system, he or she may be able to monitor othe...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2010
|
Subjects: | |
Online Access: | http://eprints.utem.edu.my/id/eprint/4640/1/Proceedings_of_ICMNS_2010.pdf http://eprints.utem.edu.my/id/eprint/4640/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknikal Malaysia Melaka |
Language: | English |
id |
my.utem.eprints.4640 |
---|---|
record_format |
eprints |
spelling |
my.utem.eprints.46402015-05-28T03:27:03Z http://eprints.utem.edu.my/id/eprint/4640/ Second Level Password Generator Tay, Choo Chuan Sakidin, Hamzah Herman, Nanna Suryana Baharon, Mohd Rizuan Q Science (General) Password gives user access to the university computing services. Every time the user connects, he or she must provide the magic word; he must prove he is who he says he is. The intruder with the necessary knowledge, experience, and tools gains entry to a system, he or she may be able to monitor other machines and systems on the same network and capture information about local users logging on to those machines. And if these users then connect to other networks, the intruder has the potential to penetrate and monitor the remote systems to which the local users connect, thereby increasing the likelihood of a breach in the security of those systems as well. Therefore, it is important to have a second level security to the user's password. Cryptography is an art to convert a message into other forms by using some algorithms. It is used widely in many fields such as securing message before sending through email, sending confidential documents or letters through networks, doing business online and etc. The two algorithms chosen to develop this system are Advanced Encryption Standard (AES) and Data Encryption Standard (DES). The purpose of choosing AES and DES is because they are two of the most popular algorithms for modern encryption. 2010 Conference or Workshop Item PeerReviewed application/pdf en http://eprints.utem.edu.my/id/eprint/4640/1/Proceedings_of_ICMNS_2010.pdf Tay, Choo Chuan and Sakidin, Hamzah and Herman, Nanna Suryana and Baharon, Mohd Rizuan (2010) Second Level Password Generator. In: The Third International Conference on Mathematics and Natural Sciences, 23-25 November 2010, Bandung, Indonesia.. |
institution |
Universiti Teknikal Malaysia Melaka |
building |
UTEM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknikal Malaysia Melaka |
content_source |
UTEM Institutional Repository |
url_provider |
http://eprints.utem.edu.my/ |
language |
English |
topic |
Q Science (General) |
spellingShingle |
Q Science (General) Tay, Choo Chuan Sakidin, Hamzah Herman, Nanna Suryana Baharon, Mohd Rizuan Second Level Password Generator |
description |
Password gives user access to the university computing services. Every time the user connects, he or she must provide the magic word; he must prove he is who he says he is. The intruder with the necessary knowledge, experience, and tools gains entry to a system, he or she may be able to monitor other machines and systems on the same network and capture information about local users logging on to those machines. And if these users then connect to other networks, the intruder has the potential to penetrate and monitor the remote systems to which the local users connect, thereby increasing the likelihood of a breach in the security of those systems as well. Therefore, it is important to have a second level security to the user's password. Cryptography is an art to convert a message into other forms by using some algorithms. It is used widely in many fields such as securing message before sending through email, sending confidential documents or letters through networks, doing business online and etc. The two algorithms chosen to develop this system are Advanced Encryption Standard (AES) and Data Encryption Standard (DES). The purpose of choosing AES and DES is because they are two of the most popular algorithms for modern encryption. |
format |
Conference or Workshop Item |
author |
Tay, Choo Chuan Sakidin, Hamzah Herman, Nanna Suryana Baharon, Mohd Rizuan |
author_facet |
Tay, Choo Chuan Sakidin, Hamzah Herman, Nanna Suryana Baharon, Mohd Rizuan |
author_sort |
Tay, Choo Chuan |
title |
Second Level Password Generator |
title_short |
Second Level Password Generator |
title_full |
Second Level Password Generator |
title_fullStr |
Second Level Password Generator |
title_full_unstemmed |
Second Level Password Generator |
title_sort |
second level password generator |
publishDate |
2010 |
url |
http://eprints.utem.edu.my/id/eprint/4640/1/Proceedings_of_ICMNS_2010.pdf http://eprints.utem.edu.my/id/eprint/4640/ |
_version_ |
1665905291279990784 |