Review of the use of human senses and capabilities in cryptography

被引:9
|
作者
Halunen, Kimmo [1 ]
Latvala, Outi-Marja [1 ]
机构
[1] VTT Tech Res Ctr Finland Ltd, Oulu, Finland
关键词
Cryptography; Human senses; Provable security; Visual cryptography; VISUAL CRYPTOGRAPHY; SECURE;
D O I
10.1016/j.cosrev.2020.100340
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptography is a key element in establishing trust and enabling services in the digital world. Currently, cryptography is realized with mathematical operations and represented in ways that are not readily accessible to human users. Thus, humans are left out of the loop when establishing trust and security in the digital world. In many areas the interaction between users and machines is being made more and more seamless and user-friendly, but cryptography has not really enjoyed such development. In this paper, we review the previous research on utilizing human senses and capabilities in cryptography. We present the most relevant existing methods and summarize the current state of the art. In addition, we propose several topics and problems that need to be solved in order to build cryptography that is more accessible to humans. These range from practical implementations of existing methods and utilizing a wider range of human senses all the way to building the theoretical foundations for this new form of cryptography. (C) 2020 The Authors. Published by Elsevier Inc.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] Review On Cryptography and Steganography Techniques in Video
    Aiswarya, S.
    Gomathi, R.
    2018 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC 2018), 2018, : 30 - 33
  • [22] In service of language? Dirk Smit on the human senses
    Conradie, Ernst M.
    STELLENBOSCH THEOLOGICAL JOURNAL, 2022, 8 (01)
  • [23] Understanding the Role of Human Senses in Interactive Meditation
    Ahmed, Mahmoud Mohamed Hussien
    Silpasuwanchai, Chaklam
    Niksirat, Kavous Salehzadeh
    Ren, Xiangshi
    PROCEEDINGS OF THE 2017 ACM SIGCHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI'17), 2017, : 4960 - 4965
  • [24] Hybrid Cryptography Algorithms in Cloud Computing: A Review
    Ahmad, Sadiq Aliyu
    Garko, Ahmed Baita
    2019 15TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTER AND COMPUTATION (ICECCO), 2019,
  • [25] Design a new visual cryptography for human-verifiable authentication in accessing a database
    Yang, Ching-Nung
    Sun, Li-Zhe
    Yan, Xuehu
    Kim, Cheonshik
    JOURNAL OF REAL-TIME IMAGE PROCESSING, 2016, 12 (02) : 483 - 494
  • [26] NEURAL AND QUANTUM CRYPTOGRAPHY IN BIG DATA: A REVIEW
    Ozcakmak, Burak
    Ozbilen, Alper
    Yavanoglu, Uraz
    Cin, Kubra
    2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 2413 - 2417
  • [27] Design a new visual cryptography for human-verifiable authentication in accessing a database
    Ching-Nung Yang
    Li-Zhe Sun
    Xuehu Yan
    Cheonshik Kim
    Journal of Real-Time Image Processing, 2016, 12 : 483 - 494
  • [28] Secure data transmission in cloud environment using visual cryptography and genetic algorithm: A review
    Mamta
    Khare, Mayank Deep
    Yadav, Chandra Shekhar
    2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN CONTROL, COMMUNICATION AND INFORMATION SYSTEMS (ICICCI-2017), 2017, : 413 - 416
  • [29] THE USE OF CRYPTOGRAPHY FOR DISTRIBUTION OF INFORMATION DURING CRISIS SITUATIONS
    Zizka, Tomas
    IDIMT-2014: NETWORKING SOCIETIES - COOPERATION AND CONFLICT, 2014, 43 : 45 - 52
  • [30] RETRACTED: The use of Cryptography in Network Security (Retracted Article)
    Jafarov, Zafar
    2015 9TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2015, : 229 - 232