← Back to VOLUME 1, ISSUE 7, SEPTEMBER 2012
This work is licensed under a Creative Commons Attribution 4.0 International License.
Identify Basis Cryptography for system bounding Security in URL Applications
K.Ramakrishna, B.Srinivasulu, U.Rakesh, B.SatheeshKumar, M.Srinivasa Rao
M.Tech (SE), Dept. of CSE, Holy Mary Institute Of Technology And Science,Hyderabad,India. M.Tech (CSE), Dept. of CSE, Holy Mary Institute Of Technology And Science,Hyderabad,India. M.Tech, Dept. of CSE, Holy Mary Institute Of Technology And Science,Hyderabad,India. Dept. of CSE, Holy Mary Institute Of Technology And Science,Hyderabad,India. Dept. of CSE, Holy Mary Institute Of Technology And Science,Hyderabad,India.
Abstract: This paper we propose and evaluate we present, which integrates public key cryptography into url applications without any browser plugins. The public key of is provided by identify basis cryptography, eliminating the need of public key and certificate online retrieval; the private key is supplied by the fragment identifier of the URL. In , two mechanisms are integrated to resolve the above challenges and provide security and privacy for system bounding url users. The first one is Identify Basis Cryptography (IBC), a type of public key cryptography in which the public key can be an arbitrary string. can provide public key encryption and digital signature for the url applications without the need of online searching and retrieving of public keys or certificates. Because the recipientโs email address, which also serves as his public key, can be easily read from the HTTP form in the message sending url page, the implementation of IBC can make easily integrated into any url applications, and run in all browsers even text basis http systems. The other is to provide the private key from the URL fragment identifier. In , the private key is encoded into the fragment identifier component of the url application URL.
Keywords: True Random Number Generator , Pseudo-random Number Generator , Key Pair Extraction, Fragment Identifier, Cryptography.
Keywords: True Random Number Generator , Pseudo-random Number Generator , Key Pair Extraction, Fragment Identifier, Cryptography.
๐ 31 views
Downloads: Download PDF
How to Cite:
[1] K.Ramakrishna, B.Srinivasulu, U.Rakesh, B.SatheeshKumar, M.Srinivasa Rao, โIdentify Basis Cryptography for system bounding Security in URL Applications,โ International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE)
