QR CODE BASED ENCRYPTED MATRIX REPRESENTATION FOR ERADICATING HARDWARE AND SOFTWARE KEYLOGGING
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 2015, Vol 4, Issue 4
Abstract
The design of secure authentication protocols is quite challenging. Involving human authentication protocols is not easy because of their limited capability of computation and memorization. Keylogging is a major problem faced in internet banking. Keylogger is a software designed to capture all a users keyboard strokes and then make use of them to impersonate a user in financial transaction, also relying on users to enhance security necessary degrades the usability. In order to enhance security as well as usability here we use RSA algorithm which avoid some problems in e-banking such as session hijacking , monitoring using video sensor etc. By providing unique key to the users after scanning the QR code available in screen. According to the unique key,the user will be given a specific 4*4 matrix keyboard in user’s smart phone which reposition the keys every time inorder to avoid hacking. To that end, there are two visual authentication protocols: one is a one-time-password protocol, and the other is a password-based authentication protocol. Through rigorous analysis, we verify that our protocols are immune to many of the challenging authentication attacks applicable in the literature.
Authors and Affiliations
R. Sangeetha , N. HarshaVinodha , A. V. Kalpana
ANTIMICROBIAL ACTIVITY OF VERNONIA AMYGLADINA AND VERNONIA COLORART ROOT BARK
The antimicrobial activity of Vernonia amygladina and Vernonia colorata root bark extracts was carried out using Agar well diffusion method on selected food borne pathogens of medical importance. Both ethanol and...
Shell Mold Casting Manufacture of Complex Parts with Thin Sections
Shell mold casting or shell molding is a metal casting process in manufacturing industry in which the mold is a thin hardened shell of sand and thermosetting resin binder backed up by some other material. The internal s...
AUTOMATION OF REST ENDPOINT OF CLUSTERED STORAGE SYSTEM
Planning, designing, developing, testing and deployment are the different phases in software development life cycle. Manually testing the storage systems is a very tedious job. There is also high chance of missing...
CYCLE TIME REDUCTION THROUGH MINIMIZATION OF TRANSPORTATION AT A PALLET MANUFACTURING COMPANY IN THE PHILIPPINES
In the pursuit of profitability and competitiveness, more companies are turning to lean manufacturing to reduce or eliminate waste in their production processes. Cycle Time Reduction to increase productivity was t...
Secure Key Exchange using Neural Network
Any cryptographic system is used to exchange confidential information securely over the public channel without any leakage of information to the unauthorized users. Neural networks can be used to generate a common...