2015
DOI: 10.1080/09720529.2014.894311
|View full text |Cite
|
Sign up to set email alerts
|

An Information Fusion approach based on prime numbers coming from RSA algorithm and Fractals for secure coding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…is satisfied , where ) 1 (  p and ) 1 (  q are two factors. In the encryption algorithm, the public key is published publicly and can be used by anyone, while the private key is confidential and only held by those with permission [15]. In the above encryption process, different key pairs are used according to the permissions of different employees, in which the private key is assigned to the employees with corresponding permissions, so as to ensure that employees can only obtain the information conforming to their permissions from the two-dimensional code.…”
Section: Privacy Information Encryption System Based Onmentioning
confidence: 99%
“…is satisfied , where ) 1 (  p and ) 1 (  q are two factors. In the encryption algorithm, the public key is published publicly and can be used by anyone, while the private key is confidential and only held by those with permission [15]. In the above encryption process, different key pairs are used according to the permissions of different employees, in which the private key is assigned to the employees with corresponding permissions, so as to ensure that employees can only obtain the information conforming to their permissions from the two-dimensional code.…”
Section: Privacy Information Encryption System Based Onmentioning
confidence: 99%
“…Random number generators (RNGs) are widely used in many fields. For example, in asymmetric (public key) algorithms such as RSA, DSA and Diffie-Hellman, they are used to generate public or private keys and generate keys in symmetric and hybrid cryptosystems [11]- [14].…”
Section: Introductionmentioning
confidence: 99%
“…The technique already proposed produces recognizable proof codes to high security for confirmation measures. While this approach consolidates Biometric code (Finger Code) and a numerical code in view of primality (RSA), to make a key encryption, by combining a numerical part, in view of primality (RSA Module), and an irregular number created by the fractal recipes [2]. As in [1], the development technique for the new code (key) created by the algorithm of fusion, will rely upon the private key of the RSA Algorithm.…”
Section: Background the Informationmentioning
confidence: 99%
“…Gerardo Iovane fabricates an access key for the protected exchanges in the blockchain [1], two non-associated territories have been joined, Face Biometrics and Public-key Cryptography to give an individual personality through Information Fusion (IF) strategies and biometric information encryption. An inventive and unique algorithm has been produced by G. Iovane, L. Puccio, G. Lamponi and A. Amorosia, which is the combination activities amongst biometric and numerical information [2], that is a calculation of Hybrid Information Fusion, named BNIF (Biometric and Numerical Information Fusion), to utilize an advanced unique mark as a biometric segment, and the result of two prime numbers as a numerical component, that is the module in RSA calculation. SIFT algorithm is one most element extraction calculation utilized as a part of PC vision to identify and depict the neighborhood highlights of the picture [11].…”
Section: Background the Informationmentioning
confidence: 99%
See 1 more Smart Citation