Review of the use of human senses and capabilities in cryptography

被引:9
|
作者
Halunen, Kimmo [1 ]
Latvala, Outi-Marja [1 ]
机构
[1] VTT Tech Res Ctr Finland Ltd, Oulu, Finland
关键词
Cryptography; Human senses; Provable security; Visual cryptography; VISUAL CRYPTOGRAPHY; SECURE;
D O I
10.1016/j.cosrev.2020.100340
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptography is a key element in establishing trust and enabling services in the digital world. Currently, cryptography is realized with mathematical operations and represented in ways that are not readily accessible to human users. Thus, humans are left out of the loop when establishing trust and security in the digital world. In many areas the interaction between users and machines is being made more and more seamless and user-friendly, but cryptography has not really enjoyed such development. In this paper, we review the previous research on utilizing human senses and capabilities in cryptography. We present the most relevant existing methods and summarize the current state of the art. In addition, we propose several topics and problems that need to be solved in order to build cryptography that is more accessible to humans. These range from practical implementations of existing methods and utilizing a wider range of human senses all the way to building the theoretical foundations for this new form of cryptography. (C) 2020 The Authors. Published by Elsevier Inc.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] A Review on Assured Deletion of Cloud Data Based on Cryptography
    Wang, Guan
    Luo, Yehong
    2020 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI2020), 2021, 187 : 580 - 585
  • [32] Quantum Cryptography for Future Networks Security: A Systematic Review
    Durr-E-Shahwar
    Imran, Muhammad
    Altamimi, Ahmed B.
    Khan, Wilayat
    Hussain, Shariq
    Alsaffar, Mohammad
    IEEE ACCESS, 2024, 12 : 180048 - 180078
  • [33] Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information Using Augmented Reality
    Lantz, Patrik
    Johansson, Bjorn
    Hell, Martin
    Smeets, Ben
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015), 2015, 8976 : 261 - 273
  • [34] Deep Learning for Medical Image Cryptography: A Comprehensive Review
    Lata, Kusum
    Cenkeramaddi, Linga Reddy
    APPLIED SCIENCES-BASEL, 2023, 13 (14):
  • [35] Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing
    Sasikumar, K.
    Nagarajan, Sivakumar
    IEEE ACCESS, 2024, 12 : 52325 - 52351
  • [36] Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks
    Fernandez-Carames, Tiago M.
    Fraga-Lamas, Paula
    IEEE ACCESS, 2020, 8 : 21091 - 21116
  • [37] The (in)adequacy of applicative use of quantum cryptography in wireless sensor networks
    Turkanovic, Muhamed
    Hoelbl, Marko
    QUANTUM INFORMATION PROCESSING, 2014, 13 (10) : 2255 - 2275
  • [38] Review: Ad-Hoc Cloud Architecture & Modern Cryptography
    Sengar, Jitendra Singh
    Sharma, Richa
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2016, 9 (06): : 45 - 50
  • [39] The (in)adequacy of applicative use of quantum cryptography in wireless sensor networks
    Muhamed Turkanović
    Marko Hölbl
    Quantum Information Processing, 2014, 13 : 2255 - 2275
  • [40] A Review of Combined Effect of Cryptography & Steganography Techniques to Secure the Information
    Mustafa, Ghulam
    Ashraf, Rehan
    Ul Haq, Inam
    Khalid, Yusra
    Ul Islam, Rafiq
    2019 5TH INTERNATIONAL CONFERENCE ON COMPUTING, ENGINEERING, AND DESIGN (ICCED), 2019,