Visually Authenticated Communication

نویسندگان

  • Igor Fischer
  • Thorsten Herfet
چکیده

Visual document authentication is a method by which humans can check document authenticity directly, without relying on computers for cryptography. In order to be applicable, it is essential that the document is represented as an image, recognizable to humans. Representing text documents as images has a series of drawbacks, like high memory and bandwidth requirements. In this paper we present two protocols for electronic exchange of visually authenticable digital documents, one requiring high bandwidth, but easy to implement in current infrastructure, and the other with low bandwidth requirements and preservation of the original document.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking

Authenticated encryption schemes are important cryptographic primitives that received extensive attention recently. They can provide both confidentiality and authenticity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, similar to the any physical implementation of any other cryptographic scheme. In this paper, a three-step CPA attack against...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

Authenticated key exchange protocol with enhanced freshness properties

In this paper, we investigate the security model for authenticated key exchange protocols. We observe that there is further room to extend the latest enhanced Canetti-Krawczyk (eCK) model. We further enhance the freshness definition for the threepass authenticated key exchange protocols such that our new definition gives the adversary more capabilities. We point out that the three-pass authenti...

متن کامل

Authentication Technologies for the Blind or Visually Impaired

Current research on “Usable Security” is still in its infancy and usable security solutions are often designed without paying attention to human disabilities. This paper aims to help fill this void in the realm of blind computer users. More specifically, we discuss research challenges we are faced with and the directions we can take towards developing authentication technologies suitable for th...

متن کامل

Autenticated Encryption Schemes with Message Linkage

Authenticated encryption schemes need redundancy schemes to link up the message blocks; however, these redundancies increase communication costs. To construct links without increasing communication costs, we propose a general solution for all the authenticated encryption schemes based on the discrete logarithm problem. Because the computation cost to construct links is small, the improved schem...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006