..

ஜர்னல் ஆஃப் கம்ப்யூட்டர் சயின்ஸ் & சிஸ்டம்ஸ் பயாலஜி

ஐ.எஸ்.எஸ்.என்: 0974-7230

திறந்த அணுகல்
கையெழுத்துப் பிரதியை சமர்ப்பிக்கவும் arrow_forward arrow_forward ..

தொகுதி 15, பிரச்சினை 9 (2022)

மினி விமர்சனம்

White Box Cryptographic Algorithms Using Enhanced Encryption Methods in Virtual Biometric Authentication

Evison Foster*

Because of its growing popularity, the use of a piece of technology known as a digital signature is becoming more common. Its primary responsibilities include detecting and preventing unauthorised changes to the data as well as verifying the identity of the signature. Some of the possible applications for digital signatures include the signing of legally binding contracts, the protection of software updates and the use of digital certificates to ensure the security of online business transactions. Digital signatures have the potential to be used in a wide range of other situations. Because it uses public channels, a public key white box is the single most important example of a public key white box. This is in addition to the process of establishing keys through insecure channels, which is also a critical component of the equation. It is critical for ensuring the security of monetary transactions that take place over open or insecure networks. Digital signature techniques are commonly used in white-box cryptographic protocols. This allows for the provision of services like entity authentication, authenticated key transfer and key agreement.

குறியிடப்பட்டது

arrow_upward arrow_upward