المصدر: | مجلة بحوث جامعة تعز - سلسلة الآداب والعلوم الإنسانية والتطبيقية |
---|---|
الناشر: | جامعة تعز |
المؤلف الرئيسي: | Alassali, Saleh Noman (Author) |
مؤلفين آخرين: | Nagi, Mohammed Mokred (Co-Author) |
المجلد/العدد: | ع34 |
محكمة: | نعم |
الدولة: |
اليمن |
التاريخ الميلادي: |
2023
|
الشهر: | يناير |
الصفحات: | 99 - 103 |
رقم MD: | 1365997 |
نوع المحتوى: | بحوث ومقالات |
اللغة: | الإنجليزية |
قواعد المعلومات: | EduSearch, AraBase, HumanIndex |
مواضيع: | |
كلمات المؤلف المفتاحية: |
Passphrases | Encryption / Decryption | Hash Function | Symmetric | Asymmetric | Message Digest Code | Confidentiality
|
رابط المحتوى: |
الناشر لهذه المادة لم يسمح بإتاحتها. |
LEADER | 02614nam a22002537a 4500 | ||
---|---|---|---|
001 | 2117779 | ||
041 | |a eng | ||
044 | |b اليمن | ||
100 | |9 724428 |a Alassali, Saleh Noman |e Author | ||
245 | |a Reducing the Risk of Forgotten Long Secret Key | ||
260 | |b جامعة تعز |c 2023 |g يناير | ||
300 | |a 99 - 103 | ||
336 | |a بحوث ومقالات |b Article | ||
520 | |b Nowadays, most peoples use PCs, and save sensitive information in their PCs. Some of users use encryption/decryption techniques to hide his/her own sensitive information, and other not use cryptography at all. But a lot of the users use unsuitable secret keys. They use either short, or weak keys, because each of short or weak keys are easy to be remembered. Those users may don’t know the risk of using weak or short keys, and they may don’t know that the security produced from cryptography are directly proportional to the quality and the length of the secret key used along with the used algorithm. Using suitable secret key, may necessitate some users to save the secret key in a file or to write it in some place, which in turn weaken the associated security. Reducing the problem of keeping long key secretly without forgotten it and without saving it in a file is a valuable problem. This paper suggests a method to generate a suitable secret keys from passphrases along with salt ’short secret key’ by using one way hash function. In the suggested method, the user can exploit some files saved in his/her PC as passphrases, and generates the actual secret key by selecting one or more of the passphrase files and hashing it/them along with the salt. The output of the hashing can be used as an actual user secret key, called message digest code. By this way, the user will remember only small secret key. | ||
653 | |a أمن المعلومات |a الحاسب الآلي |a تشفير البيانات |a تكنولوجيا المعلومات | ||
692 | |b Passphrases |b Encryption / Decryption |b Hash Function |b Symmetric |b Asymmetric |b Message Digest Code |b Confidentiality | ||
700 | |9 724432 |a Nagi, Mohammed Mokred |e Co-Author | ||
773 | |4 الادب |4 العلوم الاجتماعية ، متعددة التخصصات |6 Literature |6 Social Sciences, Interdisciplinary |c 009 |e University of Taiz Research Journal - Arts and Humanities |l 034 |m ع34 |o 0931 |s مجلة بحوث جامعة تعز - سلسلة الآداب والعلوم الإنسانية والتطبيقية |v 000 | ||
856 | |u 0931-000-034-009.pdf | ||
930 | |d n |p y |q n | ||
995 | |a EduSearch | ||
995 | |a AraBase | ||
995 | |a HumanIndex | ||
999 | |c 1365997 |d 1365997 |