Download now Free registration required
In this paper the authors propose an encryption communication protocol which also provides database security. For the encryption of the data communication they use a transformation similar to the Cubic Public-key transformation. This method represents a many-to-one mapping which increases the complexity for any brute force attack. Some interesting properties of the transformation are also included which are basic in the authentication protocol. The globally distributed database networks today demand secure communication protocol between the users. Techniques of public key cryptography use one-to-one mapping while authenticating the users. The many-to-one mapping may also be used for authentication of multiple users, which is what the authors propose here.
- Format: PDF
- Size: 220 KB