Review of the use of human senses and capabilities in cryptography
Kimmo Halunen,Outi-Marja Latvala +1 more
TLDR
This paper reviews the previous research on utilizing human senses and capabilities in cryptography, and proposes several topics and problems that need to be solved in order to build cryptography that is more accessible to humans.About:
This article is published in Computer Science Review.The article was published on 2021-02-01 and is currently open access. It has received 9 citations till now. The article focuses on the topics: Key (cryptography) & Cryptography.read more
Citations
More filters
Journal ArticleDOI
2D eπ-map for image encryption
TL;DR: In this article , a 2D chaotic map based on Euler and Pi numbers, called eπ-map, is presented, which exploits infinity diversity attribute of these numbers and a diffusion operation referred to as bit reversion is proposed for manipulating the pixel value.
Journal Article
Human Computing for Handling Strong Corruptions in Authenticated Key Exchange.
TL;DR: In this paper, the authors define the security model for Human Authenticated Key Exchange (HAKE) protocols and propose two generic protocols based on human compatible function family, password-authenticated key exchange (PAKE), commitment, and authenticated encryption.
Proceedings ArticleDOI
(2,2) Visual Cryptography Based Biometric Authentication Mechanism for Online Elections
TL;DR: In this article , the voter authentication mechanism using fingerprint matching is proposed and fingerprint matching can be considered as one of the key steps towards voter authentication along with visual cryptography along with voter authentication.
Journal ArticleDOI
Сучасні методи шифрування за допомогою алгоритму RC4
M. Petruk,O. Stavytskyi +1 more
TL;DR: This article will discuss the RC4 algorithm, also known as ARC4 or ARCFOUR – streaming cipher, which is widely used in various information security systems in computer networks (eg, SSL and TLS, wireless security algorithms WEP and WPA).
Proceedings ArticleDOI
(2,2) Visual Cryptography Based Biometric Authentication Mechanism for Online Elections
TL;DR: This paper proposes the very first step towards new way of voting that is voter authentication using fingerprint matching which can be considered as one of the key steps towards voter authentication along with visual cryptography.
References
More filters
Posted Content
Towards Human Computable Passwords
TL;DR: Feldman et al. as mentioned in this paper proposed several candidate authentication protocols for a setting in which the human user can only receive assistance from a semi-trusted computer, a computer that stores information and performs computations correctly but does not provide confidentiality.
Posted Content
The Complexity of Human Computation: A Concrete Model with an Application to Passwords
Manuel Blum,Santosh Vempala +1 more
TL;DR: In this paper, a rigorous model of human computation and associated measures of complexity is proposed to better understand what humans can compute in their heads, where the adversary is restricted to at most 10^24 (Avogadro number of) steps.
Journal ArticleDOI
Secure computation without computers
Paolo D'Arco,Roberto De Prisco +1 more
TL;DR: This paper proposes a novel method for performing secure two-party computations that, apart from the setup phase, requires neither a computing machinery nor cryptographic knowledge.
Proceedings ArticleDOI
n-Auth: Mobile Authentication Done Right
TL;DR: In this article, the authors focus on the combined usage of several strong cryptographic techniques with secure HCI design principles to achieve a better user experience, and build n-Auth, for which robust Android and iOS apps are openly available through the official stores.
Journal ArticleDOI
Sonification of a network’s self-organized criticality for real-time situational awareness
TL;DR: A system is described that sonifies in real time an information infrastructure’s self-organized criticality to alert the network administrators of both normal and abnormal network traffic and operation.