Three-Layer Security for Password Protection Using RDH, AES and ECC.
Nishant KumarSuyash GhugeC. D. JaidharPublished in: HIS (2019)
Keyphrases
- information security
- cryptographic algorithms
- elliptic curve cryptography
- security level
- security issues
- security analysis
- encryption algorithm
- security requirements
- intrusion detection
- secret key
- information systems
- user authentication
- computer security
- smart card
- critical infrastructure
- public key
- network security
- sensitive data
- data security
- data protection
- access control
- elliptic curve
- security architecture
- advanced encryption standard
- encryption decryption
- application layer
- security protocols
- private key
- authentication scheme
- protection mechanisms
- error correction
- protection scheme
- previously mentioned
- authentication mechanism
- biometric template
- smart grid
- authentication systems
- security properties
- graphical password
- public key cryptography
- high security
- password authentication
- password based authenticated key exchange