NDLI logo
  • Content
  • Similar Resources
  • Metadata
  • Cite This
  • Log-in
  • Fullscreen
Log-in
Do not have an account? Register Now
Forgot your password? Account recovery
  1. Proceedings of the Seventh International Symposium on Visualization for Cyber Security (VizSec '10)
  2. Visualizing your key for secure phone calls and language independence
Loading...

Please wait, while we are loading the content...

EMBER: a global perspective on extreme malicious behavior
Proposing a multi-touch interface for intrusion detection environments
Visualizing attack graphs, reachability, and trust relationships with NAVIGATOR
Visualizing graph dynamics and similarity for enterprise network security and management
Visual analysis of code security
PeekKernelFlows: peeking into IP flows
Visualizing host traffic through graphs
Visualizing your key for secure phone calls and language independence
Traffic classification using visual motifs: an empirical evaluation
Real-time visualization of network behaviors for situational awareness
Interactive detection of network anomalies via coordinated multiple views
Nimble cybersecurity incident management through visualization and defensible recommendations

Similar Documents

...
Information-Theoretically Secure Secret-Key Agreement by NOT Authenticated Public Discussion (1997)

Article

...
Information-Theoretically Secure Secret-Key Agreement by NOT Authenticated Public Discussion (1997)

Article

...
Information-Theoretically Secure Secret-Key Agreement by NOT Authenticated Public Discussion (1997)

Article

...
A Leakage-Resilient Certificateless Authenticated Key Exchange Protocol Withstanding Side-Channel Attacks

Article

...
Provably Secure Two-Party Explicit Authenticated Key Agreement Protocol

Article

...
An Improved Secure Authenticated Group Key Agreement Protocol for WMNs

Article

...
An Enhanced and Secure Protocol for Authenticated Key Exchange

Article

...
Provably secure identity-based authenticated key agreement protocol and its application

Article

...
Information theoretically secure encryption with almost free authentication.

Article

Visualizing your key for secure phone calls and language independence

Content Provider ACM Digital Library
Author Phatak, Dhananjay Oehler, Michael Krautheim, John
Abstract We present a method to visualize and authenticate a cryptographically negotiated key for a secure phone call. That is, each caller is presented with a graphical representation of the key and through verbal interaction (i.e., side-channel authentication) they describe what they see. If they agree, the key is authenticated and the secure media session continues. The strength of the approach lies in the vocal recognition of the callers, and their ability to confirm the image displayed by their system. The necessary degree of visual recognition is achieved by using basic shapes, color and count. People, regardless of language or age, can easily identifying these images. Our experience shows that they can communicate what they see with little effort and terminate the call when they differ. We believe that this approach reverses the current trend in security to divest users from the underlying cryptographic principles supporting secure systems by abstracting these principles to a comprehensible and visual form. This paper demonstrates that visualization and the human factor can play a pivotal role in establishing a secure communication channel. This short paper discusses how a key is visualized and provides some initial user feedback. We have named this approach the Short Authentication SymbolS VisuallY (SASSY.).
Starting Page 64
Ending Page 69
Page Count 6
File Format PDF
ISBN 9781450300131
DOI 10.1145/1850795.1850803
Language English
Publisher Association for Computing Machinery (ACM)
Publisher Date 2010-09-14
Publisher Place New York
Access Restriction Subscribed
Subject Keyword Side channel authentication Human-assisted authentication Authenticated key agreement Visual authentication
Content Type Text
Resource Type Article
  • About
  • Disclaimer
  • Feedback
  • Sponsor
  • Contact
  • Chat with Us
About National Digital Library of India (NDLI)
NDLI logo

National Digital Library of India (NDLI) is a virtual repository of learning resources which is not just a repository with search/browse facilities but provides a host of services for the learner community. It is sponsored and mentored by Ministry of Education, Government of India, through its National Mission on Education through Information and Communication Technology (NMEICT). Filtered and federated searching is employed to facilitate focused searching so that learners can find the right resource with least effort and in minimum time. NDLI provides user group-specific services such as Examination Preparatory for School and College students and job aspirants. Services for Researchers and general learners are also provided. NDLI is designed to hold content of any language and provides interface support for 10 most widely used Indian languages. It is built to provide support for all academic levels including researchers and life-long learners, all disciplines, all popular forms of access devices and differently-abled learners. It is designed to enable people to learn and prepare from best practices from all over the world and to facilitate researchers to perform inter-linked exploration from multiple sources. It is developed, operated and maintained from Indian Institute of Technology Kharagpur.

Learn more about this project from here.

Disclaimer

NDLI is a conglomeration of freely available or institutionally contributed or donated or publisher managed contents. Almost all these contents are hosted and accessed from respective sources. The responsibility for authenticity, relevance, completeness, accuracy, reliability and suitability of these contents rests with the respective organization and NDLI has no responsibility or liability for these. Every effort is made to keep the NDLI portal up and running smoothly unless there are some unavoidable technical issues.

Feedback

Sponsor

Ministry of Education, through its National Mission on Education through Information and Communication Technology (NMEICT), has sponsored and funded the National Digital Library of India (NDLI) project.

Contact National Digital Library of India
Central Library (ISO-9001:2015 Certified)
Indian Institute of Technology Kharagpur
Kharagpur, West Bengal, India | PIN - 721302
See location in the Map
03222 282435
Mail: support@ndl.gov.in
Sl. Authority Responsibilities Communication Details
1 Ministry of Education (GoI),
Department of Higher Education
Sanctioning Authority https://www.education.gov.in/ict-initiatives
2 Indian Institute of Technology Kharagpur Host Institute of the Project: The host institute of the project is responsible for providing infrastructure support and hosting the project https://www.iitkgp.ac.in
3 National Digital Library of India Office, Indian Institute of Technology Kharagpur The administrative and infrastructural headquarters of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
4 Project PI / Joint PI Principal Investigator and Joint Principal Investigators of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
Prof. Saswat Chakrabarti  will be added soon
5 Website/Portal (Helpdesk) Queries regarding NDLI and its services support@ndl.gov.in
6 Contents and Copyright Issues Queries related to content curation and copyright issues content@ndl.gov.in
7 National Digital Library of India Club (NDLI Club) Queries related to NDLI Club formation, support, user awareness program, seminar/symposium, collaboration, social media, promotion, and outreach clubsupport@ndl.gov.in
8 Digital Preservation Centre (DPC) Assistance with digitizing and archiving copyright-free printed books dpc@ndl.gov.in
9 IDR Setup or Support Queries related to establishment and support of Institutional Digital Repository (IDR) and IDR workshops idr@ndl.gov.in
I will try my best to help you...
Cite this Content
Loading...