Second Level Password Generator

Password gives user access to the university computing services. Every time the user connects, he or she must provide the magic word; he must prove he is who he says he is. The intruder with the necessary knowledge, experience, and tools gains entry to a system, he or she may be able to monitor othe...

Full description

Saved in:
Bibliographic Details
Main Authors: Tay, Choo Chuan, Sakidin, Hamzah, Herman, Nanna Suryana, Baharon, Mohd Rizuan
Format: Conference or Workshop Item
Language:English
Published: 2010
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/4640/1/Proceedings_of_ICMNS_2010.pdf
http://eprints.utem.edu.my/id/eprint/4640/
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknikal Malaysia Melaka
Language: English
id my.utem.eprints.4640
record_format eprints
spelling my.utem.eprints.46402015-05-28T03:27:03Z http://eprints.utem.edu.my/id/eprint/4640/ Second Level Password Generator Tay, Choo Chuan Sakidin, Hamzah Herman, Nanna Suryana Baharon, Mohd Rizuan Q Science (General) Password gives user access to the university computing services. Every time the user connects, he or she must provide the magic word; he must prove he is who he says he is. The intruder with the necessary knowledge, experience, and tools gains entry to a system, he or she may be able to monitor other machines and systems on the same network and capture information about local users logging on to those machines. And if these users then connect to other networks, the intruder has the potential to penetrate and monitor the remote systems to which the local users connect, thereby increasing the likelihood of a breach in the security of those systems as well. Therefore, it is important to have a second level security to the user's password. Cryptography is an art to convert a message into other forms by using some algorithms. It is used widely in many fields such as securing message before sending through email, sending confidential documents or letters through networks, doing business online and etc. The two algorithms chosen to develop this system are Advanced Encryption Standard (AES) and Data Encryption Standard (DES). The purpose of choosing AES and DES is because they are two of the most popular algorithms for modern encryption. 2010 Conference or Workshop Item PeerReviewed application/pdf en http://eprints.utem.edu.my/id/eprint/4640/1/Proceedings_of_ICMNS_2010.pdf Tay, Choo Chuan and Sakidin, Hamzah and Herman, Nanna Suryana and Baharon, Mohd Rizuan (2010) Second Level Password Generator. In: The Third International Conference on Mathematics and Natural Sciences, 23-25 November 2010, Bandung, Indonesia..
institution Universiti Teknikal Malaysia Melaka
building UTEM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknikal Malaysia Melaka
content_source UTEM Institutional Repository
url_provider http://eprints.utem.edu.my/
language English
topic Q Science (General)
spellingShingle Q Science (General)
Tay, Choo Chuan
Sakidin, Hamzah
Herman, Nanna Suryana
Baharon, Mohd Rizuan
Second Level Password Generator
description Password gives user access to the university computing services. Every time the user connects, he or she must provide the magic word; he must prove he is who he says he is. The intruder with the necessary knowledge, experience, and tools gains entry to a system, he or she may be able to monitor other machines and systems on the same network and capture information about local users logging on to those machines. And if these users then connect to other networks, the intruder has the potential to penetrate and monitor the remote systems to which the local users connect, thereby increasing the likelihood of a breach in the security of those systems as well. Therefore, it is important to have a second level security to the user's password. Cryptography is an art to convert a message into other forms by using some algorithms. It is used widely in many fields such as securing message before sending through email, sending confidential documents or letters through networks, doing business online and etc. The two algorithms chosen to develop this system are Advanced Encryption Standard (AES) and Data Encryption Standard (DES). The purpose of choosing AES and DES is because they are two of the most popular algorithms for modern encryption.
format Conference or Workshop Item
author Tay, Choo Chuan
Sakidin, Hamzah
Herman, Nanna Suryana
Baharon, Mohd Rizuan
author_facet Tay, Choo Chuan
Sakidin, Hamzah
Herman, Nanna Suryana
Baharon, Mohd Rizuan
author_sort Tay, Choo Chuan
title Second Level Password Generator
title_short Second Level Password Generator
title_full Second Level Password Generator
title_fullStr Second Level Password Generator
title_full_unstemmed Second Level Password Generator
title_sort second level password generator
publishDate 2010
url http://eprints.utem.edu.my/id/eprint/4640/1/Proceedings_of_ICMNS_2010.pdf
http://eprints.utem.edu.my/id/eprint/4640/
_version_ 1665905291279990784