Title :
An impervious QR-based visual authentication protocols to prevent black-bag cryptanalysis
Author :
R. Divya;S. Muthukumarasamy
Author_Institution :
CSE, S.A. Engineering College, Chennai, India
Abstract :
Black-bag cryptanalysis is used to acquire the cryptographic secrets from the target computers and devices through burglary or covert installation of keylogging and Trojan horse hardware/software. To overcome black-bag cryptanalysis, the secure authentication protocols are required. It mainly focuses on keylogging where the keylogger hardware or software is used to capture the client´s keyboard strokes to intercept the password. They considers various root kits residing in PCs (Personnel Computers) to observe the client´s behavior that breaches the security. The QR code can be used to design the visual authentication protocols to achieve high usability and security. The two authentication protocols are Time based One-Time-Password protocol and Password-based authentication protocol. Through accurate analysis, the protocols are proved to be robust to several authentication attacks. And also by deploying these two protocols in real-world applications especially in online transactions, the strict security requirements can be satisfied.
Keywords :
"Keyboards","Personnel","Robustness","Encryption","Hardware","Protocols"
Conference_Titel :
Intelligent Systems and Control (ISCO), 2015 IEEE 9th International Conference on
DOI :
10.1109/ISCO.2015.7282330