Call For Paper Volume:4 Issue:8 Aug'2017 |

Authentication Mechanisms For Signature Based Cryptography By Using Hierarchical Scheme

Publication Date : 30/11/2014



Author(s) :

K.K.Priya , M.Mailsamy , B.M.Brinda.


Volume/Issue :
Volume 1
,
Issue 5
(11 - 2014)



Abstract :

In this paper the signature of a person is taken as input which is encrypted using hierarchical visual cryptography. By using HVC the input signature will be divided into four shares. From that any three are taken to generate key share. Another fragmentation should handover to the authenticated server. The authenticated server should maintain the generated key and fourth fragmentation. Only the authorized user can be accessed. If the receiver identifies the fourth fragmentation and decrypt they got message by using HVC. It is insecure process because anybody can hack the decrypted message easily. For the secure process the authenticated server generate a password while transferring a message. The authenticated person can only able to got that message. The authenticated server checks whether the person should be authorized user or not, while starting their conversation. It provides more security and challenged for the hackers.


No. of Downloads :

725


Indexing

Web Design MymensinghPremium WordPress ThemesWeb Development

Authentication Mechanisms For Signature Based Cryptography By Using Hierarchical Scheme

December 4, 2014