Skip to Main Content
Iris Biometric Model for Secured Network Access
book

Iris Biometric Model for Secured Network Access

by Franjieh El Khoury
April 2016
Intermediate to advanced content levelIntermediate to advanced
220 pages
5h 23m
English
CRC Press
Content preview from Iris Biometric Model for Secured Network Access
41
3
cryptography
In this chapter we present a description and a comparison of
different methods of cryptography: symmetric cryptography,
asymmetric cryptography, digital signature, and digital certifi-
cate. e comparative study of these methods helped us decide
to use the method based on asymmetric cryptography using the
algorithm Rivest–Shamir–Adleman (RSA) (Stallings 1999).
is method has a mode of transmission faster than other algo-
rithms that can be used (MD4, MD5, SHA, and SHA-1).
3.1 Introduction
Cryptography is a method to make information unreadable to ensure
access to a single authenticated recipient (Otto 2004). is approach
ensures the anonymity and the security for confidentiality, authentic-
ity, and integrity of information (Futura- ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advances in Biometrics for Secure Human Authentication and Recognition

Advances in Biometrics for Secure Human Authentication and Recognition

Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing
Touchless Fingerprint Biometrics

Touchless Fingerprint Biometrics

Ruggero Donida Labati, Vincenzo Piuri, Fabio Scotti

Publisher Resources

ISBN: 9781466502147