Second Level Password Generator

Password gives user access to the university computing services. Every time the user connects, he or she must provide the magic word; he must prove he is who he says he is. The intruder with the necessary knowledge, experience, and tools gains entry to a system, he or she may be able to monitor othe...

Full description

Bibliographic Details
Main Authors: Tay, Choo Chuan, Sakidin, Hamzah, Herman, Nanna Suryana, Baharon, Mohd Rizuan
Format: Conference or Workshop Item
Language:English
Published: 2010
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/4640/
http://eprints.utem.edu.my/id/eprint/4640/1/Proceedings_of_ICMNS_2010.pdf
_version_ 1848887054756216832
author Tay, Choo Chuan
Sakidin, Hamzah
Herman, Nanna Suryana
Baharon, Mohd Rizuan
author_facet Tay, Choo Chuan
Sakidin, Hamzah
Herman, Nanna Suryana
Baharon, Mohd Rizuan
author_sort Tay, Choo Chuan
building UTeM Institutional Repository
collection Online Access
description Password gives user access to the university computing services. Every time the user connects, he or she must provide the magic word; he must prove he is who he says he is. The intruder with the necessary knowledge, experience, and tools gains entry to a system, he or she may be able to monitor other machines and systems on the same network and capture information about local users logging on to those machines. And if these users then connect to other networks, the intruder has the potential to penetrate and monitor the remote systems to which the local users connect, thereby increasing the likelihood of a breach in the security of those systems as well. Therefore, it is important to have a second level security to the user's password. Cryptography is an art to convert a message into other forms by using some algorithms. It is used widely in many fields such as securing message before sending through email, sending confidential documents or letters through networks, doing business online and etc. The two algorithms chosen to develop this system are Advanced Encryption Standard (AES) and Data Encryption Standard (DES). The purpose of choosing AES and DES is because they are two of the most popular algorithms for modern encryption.
first_indexed 2025-11-15T19:48:17Z
format Conference or Workshop Item
id utem-4640
institution Universiti Teknikal Malaysia Melaka
institution_category Local University
language English
last_indexed 2025-11-15T19:48:17Z
publishDate 2010
recordtype eprints
repository_type Digital Repository
spelling utem-46402015-05-28T03:27:03Z http://eprints.utem.edu.my/id/eprint/4640/ Second Level Password Generator Tay, Choo Chuan Sakidin, Hamzah Herman, Nanna Suryana Baharon, Mohd Rizuan Q Science (General) Password gives user access to the university computing services. Every time the user connects, he or she must provide the magic word; he must prove he is who he says he is. The intruder with the necessary knowledge, experience, and tools gains entry to a system, he or she may be able to monitor other machines and systems on the same network and capture information about local users logging on to those machines. And if these users then connect to other networks, the intruder has the potential to penetrate and monitor the remote systems to which the local users connect, thereby increasing the likelihood of a breach in the security of those systems as well. Therefore, it is important to have a second level security to the user's password. Cryptography is an art to convert a message into other forms by using some algorithms. It is used widely in many fields such as securing message before sending through email, sending confidential documents or letters through networks, doing business online and etc. The two algorithms chosen to develop this system are Advanced Encryption Standard (AES) and Data Encryption Standard (DES). The purpose of choosing AES and DES is because they are two of the most popular algorithms for modern encryption. 2010 Conference or Workshop Item PeerReviewed application/pdf en http://eprints.utem.edu.my/id/eprint/4640/1/Proceedings_of_ICMNS_2010.pdf Tay, Choo Chuan and Sakidin, Hamzah and Herman, Nanna Suryana and Baharon, Mohd Rizuan (2010) Second Level Password Generator. In: The Third International Conference on Mathematics and Natural Sciences, 23-25 November 2010, Bandung, Indonesia..
spellingShingle Q Science (General)
Tay, Choo Chuan
Sakidin, Hamzah
Herman, Nanna Suryana
Baharon, Mohd Rizuan
Second Level Password Generator
title Second Level Password Generator
title_full Second Level Password Generator
title_fullStr Second Level Password Generator
title_full_unstemmed Second Level Password Generator
title_short Second Level Password Generator
title_sort second level password generator
topic Q Science (General)
url http://eprints.utem.edu.my/id/eprint/4640/
http://eprints.utem.edu.my/id/eprint/4640/1/Proceedings_of_ICMNS_2010.pdf