Ahmed Asimi

Learn More
Nowadays, client authentication in Web applications for each user based on passwords and a statically salts [11, 13, 18, 19]. The aim of this article is to propose random generator of a safe cryptographic salt per session (RGSCS). The interest to introduce this regenerator is to contribute to the evolution of the cryptographic quality of the systems of(More)
Currently, the security of the users’ privacy in public spaces has more concerns especially in web applications. Also, the unconsciousness of users by the importance of the quality cryptographic of these authentication parameters makes their commoditized accounts. Hence, investment in the computer discipline becomes more demanding to prevent potential(More)
Despite the development of new technologies of information and communication following the advent of the Internet and networks, computer security has become a major challenge, and works in this research are becoming more numerous. Various tools and mechanisms are developed to ensure a level of security to meet the demands of modern life. Among the systems,(More)
The majority of current web authentication is built on username/password. Unfortunately, password replacement offers more security, but it is difficult to use and expensive to deploy. In this paper, we propose a new mutual authentication scheme called StrongAuth which preserves most password authentication advantages and simultaneously improves security(More)
Inspired by evolutionist systems, combined with transforms based on classes of three states; R.ANMJ algorithm simulates the evolution of dynamic systems, dissipative under compensation, adapted in order to generate a strongly chaotic behavior for any initial state, thus to generate binary sequences that are cryptographically safe. This article will focus on(More)
User authentication and session management are two of the most critical aspects of computer security and privacy on the web. However, despite their importance, in practice, authentication and session management are implemented through the use of vulnerable techniques. To solve this complex problem, we proposed new authentication architecture, called(More)
In this article, we propose a new symmetric communication system secured, founded upon strong zero knowledge authentication protocol based on session keys (SASK). The users’ authentication is done in two steps: the first is to regenerate a virtual password, and to assure the integrity and the confidentiality of nonces exchanged thanks to the symmetric(More)
the Intrusion Detection Systems (IDS) are now an essential component in the structure of network security. The logs of connections and network activity, with a large amount of information, can be used to detect intrusions. Despite the development of new technologies of information and communication following the advent of the Internet and networks, computer(More)
In this paper, we propose a new synchronous stream cipher called SSCQF whose secret-key is   N 1,...z z  S K where i z is a positive integer. Let N d d d ,..., , 2 1 be N positive integers in   1 2 ,..., 1 , 0  m such that i i z d  mod m 2 with m and 8  m . Our purpose is to combine a linear feedback shift registers LFSRs, the arithmetic of(More)