PHISHING PREVENTION USING SERVER AUTHENTICATION
Keywords:
ELLIPTICAL CRYPTOGRAPHY, VISUAL CRYPTOGRAPHY, PHISHING, SECURITY ETCAbstract
In the modern computer era attacks on systems are increasing. Phishing is one of the serious offenses being committed. In Phishing hacker or group of hackers tries to acquire confidential information such as passwords or bank details etc in an attempt to steal users identity for financial gain or something much worse. In this paper, we are proposing an approach named “Phishing Prevention using server authentication” using which user can check the authenticity of the server with which he is willing to communicate. Here we are using visual cryptography along with general password authentication. In this scheme authentication via images is done. Here the keys being used could be single use keys or one for the time user wants to keep(depending on the will of the implementing party ). Under this scheme, the user chooses an image of his will. Then he performs cryptography operation over chosen image and converts it into shares (two at least). User uploads one share onto the trusted server and keeps the other one to himself. The user needs to be attentive while uploading the encrypted share and must upload it only to a trusted server. Whenever the user wants to authenticate the server he asks for the stored share. The server sends the share back to the user after authenticating the user. The user receives the share and performs decryption to obtain the original image. If the image received after decryption is same as original, it implies the server is authentic and the user can proceed with the rest of the transaction.
References
Ollmann G., the Phishing Guide Understanding & Preventing PhishingAttacks, NGS Software Insight Security Research.
M. Naor and A. Shamir, Visual cryptography, in Proc. EUROCRYPT, 1994,pp. 1–12 .
B. Borchert, .Segment Based Visual Cryptography, WSI Press, Germany, 2007.
A literature survey on social engineering attacks: Phishing attack.Surbhi Gupta; Abhishek Singhal;Akanksha Kapoor 2016 InternationalConference on Computing,Communication nd Automation (ICCCA) Year: 2016.
Aboli bhanji, Priyanka jadhav, Sayali Bhujbal, Punam Mulak, Secure ServerVerification By Using RSA Algorithm And Visual Cryptography in IJERT, 2013.
Soram Ranbir Singh, Ajoy Kumar Khan,Takhellambam Sonamani Singh, A Critical Review on Elliptic Curve Cryptography, IEEE Conference, 2016.
Omkar Guru et al., NIT Rourkela, 2007
Megha Kolhekar, Anita Jadhav, Implementation of Elliptic CurveCryptography On Text And Image,IJECBS 2011
Fatema Akhter, A Novel Elliptic.Curve Cryptography Scheme Using dom Sequence.
Additional Files
Published
How to Cite
Issue
Section
License
Copyright (c) 2021 International Education and Research Journal (IERJ)

This work is licensed under a Creative Commons Attribution 4.0 International License.