A NovelQR-Code Authentication Protocol Using Visual Cryptography for Secure Communications

نویسنده

  • A. John Blesswin
چکیده

Visual cryptography (VC) is a distinct type of secret sharing scheme which hides secret images in share images such that, when the shares are superimposed, a hidden secret image is revealed. It does not require the complex computational method to decode the secret information. The paper proposes a novel Quick Response (QR) code authentication system using Visual Cryptography. The passwords for authentication are encoded as QR-codes and later encrypted into share images. Thus, the share images by itself convey no information, but when the layers are combined, the secret password is revealed. The only necessary is that the user needs to handle a device containing a QR-code reader, most probably a Smartphone. The experimental result shows that the proposed QAP scheme provides secure data transmission with less computational complexity.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

A Lightweight Authentication Protocol for Secure Communications between Resource-Limited Devices and Wireless Sensor Networks

The number of Resource-Limited Wireless Devices utilized in many areas of IT is growing rapidly. Some of the applications of these devices pose real security threats that can be addressed using authentication and cryptography. Many of the available authentication and encryption software solutions are predicated on the availability of ample processing power and memory. These demands cannot be me...

متن کامل

Teaching Secure Data Communications Using a Game Representation

The Security Protocol Game is a highly visual and interactive game for teaching secure data communication protocols. Students use the game to simulate protocols and explore possible attacks against them. The power of the game lies in the representation of secret and public key cryptography. Specifically, the game provides representations for plain text and encrypted messages, message digests, d...

متن کامل

An efficient secure channel coding scheme based on polar codes

In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...

متن کامل

A Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography

Kerberos is an authentication protocol in which client and server can mutually authenticate to each other across an insecure network connection, to ensure data integrity of the message and privacy of channel communications. In this paper, a new novel is proposed to improve Kerberos authentication protocol by using Secret Image. This proposed modification in Kerberos will be modified to yield be...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016