(IJCSIS) International Journal of Computer Science and Information Security,Vol. 9, No. 7, 2011
Development of enhanced token using picture password and public key infrastructure mechanism for digital signature
Oghenerukevwe E. Oyinloye /Achievers UniversityOwo
Department of Computer and Information Systems,Achievers University, OwoAchievers University, Owo, AUOOndo, Nigeria.email@example.com
Akinbohun Folake/ Rufus Giwa Polytechnic,Owo
Department of Computer Science, Rufus GiwaPolytechnic, OwoRufus Giwa Polythenic, OwoOndo, Nigeria.firstname.lastname@example.org
Ayodeji .I. Fasiku,
Boniface K.Alese (PhD)
Department of Computer Science, Federal Universityof Technology, AkureFederal University of Technology, Akure, FUTAAkure, Nigeria.
the recent advances in actualizing a highly networkedenvironment where data is been exchanged from one person toanother electronically has given great concern for data integrity,confidentiality and security. It is stated that the exchange of information range from telephone conversation, computer files,signals e.t.c. The vulnerability of networks makes data exchangeprone to a high level of security threats. Security mechanisms arebeen employed in the transport layer but there is a need to extendsecurity mechanisms to the information/data been exchanged. Severalsecurity measures have been deployed so far Which include PINS,textual passwords (which are vulnerable to brute force, dictionaryattack, complex meaningless password), graphical passwords andPKIs to reduce the risk of loss which can be valued at great amounts,but all of these have not provided the user the convenience andinterest required to achieve full human capabilities in securing data.This paper proffers an improved solution for data security, integrityand confidentiality via the development of enhanced token for datasignature using the underlining technologies of picture passwordalgorithm and public key infrastructure.
Digital Signature, Enhanced Token Private Key, Enhanced Token Public Key, Secure Hash Algorithm, Public Key Infrastructure, Picture Password algorithm, RSA
The recent advances in actualizing a highly networkedenvironment where data is been exchanged from one person toanother electronically has given great concern for dataintegrity, confidentiality and security. Steven  statedthat the exchange of information range from telephoneconversation, computer files, signals e.t.c.As LAN Technology continues to spread across organization,the security of documents as well as its integrity andconfidentiality is essential due to the high rate at whichnetworks are prone to several security attacks called threats.These threats range from objects, persons e.t.c.The vulnerability of documents exchange across networksmakes security threats easy. Mark  stated that securitythreats are threats that break through security mechanism of anorganizations network due to the vulnerability of the network.As security mechanisms are been employed in the transportlayer, it is important to extend these security mechanisms tothe information been exchanged.It has been observed that despite the security measuresemployed so far ranging from PINS, textual passwords hasresulted in ease to generate PINs as they are mostly four-digitentry with pas 0-9digits which are vulnerable to brute forceattacks, textual passwords are vulnerable to dictionary attacks,and the use of meaningless strong passwords therebydefeating the purpose of strong passwords and the use of passwords in general, graphical passwords have beenemployed but do not ascertain the integrity, confidentiality of the data, Public Key Infrastructure (PKI) (symmetric andasymmetric) Public Key Infrastructure was developed tomanage security, confidentiality and integrity of data but it use