QR CODE BASED ENCRYPTED MATRIX REPRESENTATION FOR ERADICATING HARDWARE AND SOFTWARE KEYLOGGING
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 2015, Vol 4, Issue 4
Abstract
The design of secure authentication protocols is quite challenging. Involving human authentication protocols is not easy because of their limited capability of computation and memorization. Keylogging is a major problem faced in internet banking. Keylogger is a software designed to capture all a users keyboard strokes and then make use of them to impersonate a user in financial transaction, also relying on users to enhance security necessary degrades the usability. In order to enhance security as well as usability here we use RSA algorithm which avoid some problems in e-banking such as session hijacking , monitoring using video sensor etc. By providing unique key to the users after scanning the QR code available in screen. According to the unique key,the user will be given a specific 4*4 matrix keyboard in user’s smart phone which reposition the keys every time inorder to avoid hacking. To that end, there are two visual authentication protocols: one is a one-time-password protocol, and the other is a password-based authentication protocol. Through rigorous analysis, we verify that our protocols are immune to many of the challenging authentication attacks applicable in the literature.
Authors and Affiliations
R. Sangeetha , N. HarshaVinodha , A. V. Kalpana
DESIGN AND ANALYSIS OF ALUMINUM ALLOY PISTON USING CAE TOOLS
Recent advancement of technology leads to complex decision in the Engineering field. Thus this paper entails the design and analysis of an IC engine piston using two different aluminum materials that are competitive in m...
TEXT INFORMATION EXTRACTION USING RULE BASED METHOD
Information is hidden in large volume of files thus it is necessary to find useful information and extract it from file contents. Information Extraction (IE) is the task of automatically extracting structured informati...
RETROFITTING OF CONCRETE CIRCULAR COLUMNS USING CFRP
Structures of architectural importance present a number of challenges in restoration and retrofit, which limit the application of modern codes and building standards. Recommendations are desirable and necessary to...
Analysing the Behaviour of Software Agent through a Set of Measures of Agent Oriented Metrics
An Agent Oriented Software Engineering is a new programming paradigm that has evolved itself from Object Oriented Software Engineering. AOSE has placed greater emphasis on agent characteristics such as social abil...
A SURVEY ON IMAGE INTERPOLATION TECHNIQUES
To obtain more details in an image, image super-resolution (SR) technology is always desirable in visual information processing. It aims in reconstructing a high-resolution (HR) image from one or more low-resolution (L...