Bangladesh is a densely populated developing country. Development of a country highly depends on education. It is quite impossible for a developing country to educate all their citizens as resources and other facilities are limited. Huge amount of money is required to establish such infrastructure and facility. Open and distance learning (ODL) is an affordable solution to this problem. It is an important part of the education system now. It covers a large number of people for imparting education. This education system is very helpful for those who are unable to attend at the traditional class room program. Technology is now entered into all parts of the society. The ODL education system is also benefited with the wide application of different technological tools. The goal of this paper is to show the advancement of technology in ODL system, so that it can help many educational institutions to offer programs in distance learning mode. It is the only way to bring the quality education to everyone's door step in Bangladesh.
For most cryptosystems, by using a single-system master key there is a need to protect many important encryption and decryption keys used to achieve data security. There are three major drawbacks under this single-master key arrangement. First, if the master key is disclosed to the public by accident, then the entire system has no secrecy at all. Second, if the master key is lost, then all the keys under protection become inaccessible. Third, if the owner of the master key becomes disloyal, then all important information becomes completely available to the opponents. The secret sharing scheme was designed to overcome these problems.Shamir's (t, n)-threshold scheme is one of the most wellknown examples of secret sharing schemes which provides a very simple and efficient way to share a secret among any t of the n participants.The primary goal of our research is to study the terminology and protocols behind secret sharing schemes and implement Shamir's scheme using Java. In addition, we have also introduced a new scheme for extending the Shamir's scheme on proactive network. General TermsCryptography and Network security.
Purpose-This paper concentrates on the comparison of security auditing tools specifying password cracking tools based on different matrices. Passwords are the most popular and dominant means of access control in every authentication process. Every password is vulnerable in the virtual world; all we can do is to delay it for one to break into us. Password cracking used in two opposite intentions; either it can be used for an administrator to protect from unauthorized access and for users to recover forgotten passwords or for an intruder to break into a secure system. Method-A great number of attacks on many systems are related to passwords. Awkwardly, the randomness and length of user-chosen passwords remain the same over time, but in contrast, hardware enhancement continuously gives intruders increasing computational power. So, password cracking has been one of the favorite vulnerable aspects for intruders to gain access to any unauthorized system. Among all available freeware password cracking tools, we choose five renowned tools based on offline and online categories. Results-Cain and Abel is the winner in the offline category, and TCH-Hydra is the winner in the online category in their performance among the tools we have tested. Conclusion-In this paper, the data has been collected by testing each tool several times in different systems as well as all tools in the same system based on different matrices. We have come to a knowledgeable result by comparing data among themselves. The 408 results of the comparison will help in the adoption and usage of these tools and also promote the development and usage of security auditing tools. Recommendations-The results of the comparison will help in the adoption and usage of these tools and also promote the development and usage of security auditing tools.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.