QR CODE BASED ENCRYPTED MATRIX REPRESENTATION FOR ERADICATING HARDWARE AND SOFTWARE KEYLOGGING
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 2015, Vol 4, Issue 4
Abstract
The design of secure authentication protocols is quite challenging. Involving human authentication protocols is not easy because of their limited capability of computation and memorization. Keylogging is a major problem faced in internet banking. Keylogger is a software designed to capture all a users keyboard strokes and then make use of them to impersonate a user in financial transaction, also relying on users to enhance security necessary degrades the usability. In order to enhance security as well as usability here we use RSA algorithm which avoid some problems in e-banking such as session hijacking , monitoring using video sensor etc. By providing unique key to the users after scanning the QR code available in screen. According to the unique key,the user will be given a specific 4*4 matrix keyboard in user’s smart phone which reposition the keys every time inorder to avoid hacking. To that end, there are two visual authentication protocols: one is a one-time-password protocol, and the other is a password-based authentication protocol. Through rigorous analysis, we verify that our protocols are immune to many of the challenging authentication attacks applicable in the literature.
Authors and Affiliations
R. Sangeetha , N. HarshaVinodha , A. V. Kalpana
ACTIVITY BASED COSTING-A TOOL TO CONTROL THE COST
Activity-based costing (ABC) is a costing methodology that identifies activities in an organization and assigns the cost of each activity with resources to all products and services according to the actual consump...
HAMILTONIAN LACEABILITY IN MIDDLE GRAPHS
This paper is aimed to discuss Hamiltonian laceability in the context of the Middle graph of a graph. We explore laceability properties of the Middle graph of the Gear graph, Fan graph, Wheel graph, Path and Cycle...
ELECTRICAL ENERGY CONSERVATION IN A DISTILLERY PLANT- A CASE STUDY
Energy is a main function for each kind of process. It is the central force behind our productivity, our leisure and our environment. Energy Audit is the integral part of Energy Management. The energy audit can unearth h...
Fingerprint and GSM based Security System
The main purpose of this paper is to design and implement high security system. Security is a prime concern in our day-to-day life. Perhaps the most important application of accurate personal identification is s...
Intrinsic Plagiarism Detection for Text Based Features Pattern
Plagiarism detection means detecting the document whether copied or stealing from the other document. The main goal is to detect the word by analyzing the writing style using technique intrinsic plagiarism detecti...