Publication | Open Access
A high security log-in procedure
140
Citations
5
References
1974
Year
Authentication AuthorizationEngineeringUsable SecurityInformation SecurityCryptographic TechnologyShannon CodesHardware SecurityPrime ModulusCryptanalysisData Encryption StandardData PrivacyLightweight CryptographyComputer SciencePurpose PolynomialsData SecurityCryptographyCryptographic ProtectionSecurityAuthentication Access Control
The protection of time sharing systems from unauthorized users is often achieved by the use of passwords. By using one-way ciphers to code the passwords, the risks involved with storing the passwords in the computer can be avoided. We discuss the selection of a suitable one-way cipher and suggest that for this purpose polynomials over a prime modulus are superior to one-way ciphers derived from Shannon codes.
| Year | Citations | |
|---|---|---|
1949 | 9.2K | |
1960 | 3.6K | |
1961 | 2K | |
1970 | 157 | |
1969 | 54 |
Page 1
Page 1