Application of FI sequences for authentication in a network

  • Authors:
  • Cleopas O. Angaye;Paul S. Fisher

  • Affiliations:
  • National Information Technology Development Agency (NITDA), Abuja, Nigeria;Winston-Salem State University, Winston-Salem, NC

  • Venue:
  • ACM-SE 45 Proceedings of the 45th annual southeast regional conference
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

The increase of information transmitted electronically demands ever more efficient and effective ways to develop principles and practices for secure information transmission. Such efforts are concerned with confidentiality, integrity, authentication, and non-repudiation. The Internet and other networks allow people to transmit sensitive data to do online banking, data distribution, online trading, purchases with credit cards, and marketing. Millions of people need the confidence found in the physical world to be available electronically allowing them to do business without the worries of deceit and deception. The study of cryptography developing digital signatures, RSA, Diffie-Hellman, and Elliptic curve approaches has minimized the cryptographic security concerns of electronic and Internet users. There are several drawbacks in most of the current cryptographic systems [9], [3]. In this study we explore the use of FI technology further described in the [4], [5], [2], [6], and [1] for cryptographic systems.