14th International Conference on Science, Engineering and Technology | |
Sequential mathematical solution for authentication and authorization technique implementing encryption methodology creating secure transaction using various methods also at quantum level | |
自然科学;工业技术 | |
Gharami, Snigdha^1 ; Dinakaran, M.^1 | |
School of Information Technology and Engineering, VIT University, Vellore | |
Tamil Nadu | |
632014, India^1 | |
关键词: Analysis of various; Authentication and authorization; Extended researches; Mathematical calculations; Mathematical solutions; Multiple layers; Secure transactions; Social interactions; | |
Others : https://iopscience.iop.org/article/10.1088/1757-899X/263/4/042013/pdf DOI : 10.1088/1757-899X/263/4/042013 |
|
来源: IOP | |
【 摘 要 】
We see challenges in authenticating each aspect of electronic usage, starting from transaction to social interaction the authenticity and availability of correct information is guided in various ways. Authentication and authorization follow one another; a process of authentication is calculated on multiple layers of steps. In this paper we discuss various possibilities of modifying and using ways to deal with authentication and authorization mechanism. Idea is to work through authentication with mathematical calculations. We will go through various scenarios and find out the system of information that fits best at the moment of need. We will take account of new approaches of authentication and authorization while working on mathematical paradigm of information. The paper also takes an eye on quantum cryptography and discusses on how it could help one in the present scenario. This paper is divided into sections discussing on various paradigm of authentication and how one can achieve it in secure way, this paper is part of research work where analysis of various constraints are to be followed in the extended research work.
【 预 览 】
Files | Size | Format | View |
---|---|---|---|
Sequential mathematical solution for authentication and authorization technique implementing encryption methodology creating secure transaction using various methods also at quantum level | 595KB | download |