SD-EQR: A New Technique To Use QR CodesTM in Cryptography

نویسنده

  • Somdip Dey
چکیده

In this paper the author present a new technique of using QR Codes (commonly known as ‘Quick Respond Codes’) in the field of Cryptography. QR Codes are mainly used to convey or store messages because they have higher or large storage capacity than any other normal conventional ‘barcodes’. In this paper the primary focus will be on storing messages in encrypted format with a password and send it to the required destination hiding in a QR Code, without being tracked or decrypted properly by any hacker or spyware. Since QR Codes have fast response time and have large storage capacity, QR Codes can be used perfectly to send encrypted data (messages) to the receiver. This method will be suitable in any business house, government sectors, communication network to send their encrypted messages faster to the destination. Or a person can even use this method to keep his important documents, like passport number, pan-card id, social security number, perfectly secured with him all the time, without the information getting leaked to outside world. The new method is achieved by entering the message along with a password. This password will generate a secret code, which will be added to each digit or alphabet in the numbers or text entered in the message (which is needed to be encrypted) and generate the first phase of encryption. That newly generated encrypted message will again be encrypted using various other methods to generate the final encrypted message.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms

Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...

متن کامل

Anti-Phishing framework based on Extended Visual Cryptography and QR code

Nowadays Online transactions are become very common and there are various attacks occur behind this. In these types of various attacks, phishing is very common attack. For detecting this attack various anti-phishing mechanisms are used. Propose a new authentication scheme for se-cure OTP distribution in phishing website detection through EVC and QR codes. The Website Detection using extended vi...

متن کامل

QR Code Steganography

QR codes, also known as matrix codes, are basically two dimensional barcodes embedded with data that can be decoded quickly for information. In this work, we present a novel use of QR codes. We show that QR codes can be used for covert communication using steganography. We also show in complete detail how to build QR code symbols with a hidden payload and how to extract this hidden information ...

متن کامل

Enhancing the Data Capacity of QR Codes by Compressing the Data before Generation

Quick Response (QR) Codes helps us in encoding the data in an efficient manner. The data capacity is limited according to the various data formats used. For increasing the data capacity, data to be encoded can first be compressed using any of the data compression techniques. Then, the data can be encoded. This paper suggests a technique for data compression which in turn helped to increase the ...

متن کامل

A Decentralized Online Sortition Protocol

We propose a new online sortition protocol which is decentralized. We argue that our protocol has safety, fairness, randomness, non-reputation and openness properties. Sortition is a process that makes random decision and it is used in competitions and lotteries to determine who is the winner. In the real world, sortition is simply done using a lottery machine and all the participa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1205.4829  شماره 

صفحات  -

تاریخ انتشار 2012