|
 |
Bimonthly Since 1986 |
ISSN 1004-9037
|
|
 |
|
|
Publication Details |
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
|
|
|
|
|
|
|
|
|
|
|
09 May 2023, Volume 38 Issue 3
|
|
|
Abstract
In today's world, using a user password or PIN number is required for any monitory, financial, and secret communication transactions. The possible increase in security is increased by sharing a strong PIN or one-time password. As encrypted symmetric keys in key block structures with usage limits on protected keys, the Crypto Council for Innovation (CCI) is establishing a number of PIN security standards. These key blocks don't assume that previously established keys can be used again. The encryption and migration method for passwords or PINs is described in the current paper using Catalan number sequences. In this case, the recipient receives a long, random text that contains the encrypted password or PIN inserted at various points throughout. The sender and the receiver are unaware of the placements of the inputted PIN characters.
Keyword
Encryption, Polygon triangulation, Decryption Catalan Number
PDF Download (click here)
|
|
|
|
|