scispace - formally typeset
Open AccessJournal ArticleDOI

Review of the use of human senses and capabilities in cryptography

TLDR
This paper reviews the previous research on utilizing human senses and capabilities in cryptography, and proposes several topics and problems that need to be solved in order to build cryptography that is more accessible to humans.
About
This article is published in Computer Science Review.The article was published on 2021-02-01 and is currently open access. It has received 9 citations till now. The article focuses on the topics: Key (cryptography) & Cryptography.

read more

Citations
More filters
Journal ArticleDOI

2D eπ-map for image encryption

TL;DR: In this article , a 2D chaotic map based on Euler and Pi numbers, called eπ-map, is presented, which exploits infinity diversity attribute of these numbers and a diffusion operation referred to as bit reversion is proposed for manipulating the pixel value.
Journal Article

Human Computing for Handling Strong Corruptions in Authenticated Key Exchange.

TL;DR: In this paper, the authors define the security model for Human Authenticated Key Exchange (HAKE) protocols and propose two generic protocols based on human compatible function family, password-authenticated key exchange (PAKE), commitment, and authenticated encryption.
Proceedings ArticleDOI

(2,2) Visual Cryptography Based Biometric Authentication Mechanism for Online Elections

TL;DR: In this article , the voter authentication mechanism using fingerprint matching is proposed and fingerprint matching can be considered as one of the key steps towards voter authentication along with visual cryptography along with voter authentication.
Journal ArticleDOI

Сучасні методи шифрування за допомогою алгоритму RC4

M. Petruk, +1 more
TL;DR: This article will discuss the RC4 algorithm, also known as ARC4 or ARCFOUR – streaming cipher, which is widely used in various information security systems in computer networks (eg, SSL and TLS, wireless security algorithms WEP and WPA).
Proceedings ArticleDOI

(2,2) Visual Cryptography Based Biometric Authentication Mechanism for Online Elections

TL;DR: This paper proposes the very first step towards new way of voting that is voter authentication using fingerprint matching which can be considered as one of the key steps towards voter authentication along with visual cryptography.
References
More filters
Posted Content

Towards Human Computable Passwords

TL;DR: Feldman et al. as mentioned in this paper proposed several candidate authentication protocols for a setting in which the human user can only receive assistance from a semi-trusted computer, a computer that stores information and performs computations correctly but does not provide confidentiality.
Posted Content

The Complexity of Human Computation: A Concrete Model with an Application to Passwords

TL;DR: In this paper, a rigorous model of human computation and associated measures of complexity is proposed to better understand what humans can compute in their heads, where the adversary is restricted to at most 10^24 (Avogadro number of) steps.
Journal ArticleDOI

Secure computation without computers

TL;DR: This paper proposes a novel method for performing secure two-party computations that, apart from the setup phase, requires neither a computing machinery nor cryptographic knowledge.
Proceedings ArticleDOI

n-Auth: Mobile Authentication Done Right

TL;DR: In this article, the authors focus on the combined usage of several strong cryptographic techniques with secure HCI design principles to achieve a better user experience, and build n-Auth, for which robust Android and iOS apps are openly available through the official stores.
Journal ArticleDOI

Sonification of a network’s self-organized criticality for real-time situational awareness

TL;DR: A system is described that sonifies in real time an information infrastructure’s self-organized criticality to alert the network administrators of both normal and abnormal network traffic and operation.
Related Papers (5)