Abstract
Many applications handle confidential information from their users. These information need to be handled in a secure way. One way of handling information securely is through cryptography. Usual cryptosystems are secure, but they have the hardness of cryptography keys handling. One way to protect these cryptography keys is through authentication mechanisms and the most common authenticatio…