Visual Cryptography

Discussion in 'Computer Security' started by Jyothirmai, Nov 9, 2005.

  1. Jyothirmai

    Jyothirmai Guest

    Hi,

    I have read in "Visual Cryptography", how an image can be reconstructed
    "visually" by superimposing two shares. But I have not understood how
    this can help in authenticating a user?

    Are there any practical implementations of this technique? If so, how do
    they deal with the probelm of sending the image across the wire, securely?

    Can someone explain this.

    Thanks in advance.

    -J
     
    Jyothirmai, Nov 9, 2005
    #1
    1. Advertising

  2. Jyothirmai

    0xception Guest

    Yeah there is a very good electronic voting machine that implements
    visual cryptography....
    see PDF: http://www.voterverifiable.com/article.pdf

    This doesn't actually authenticate the user but it shows a good
    implementation... this is secure because even if you send the image
    across the wire it is only half of of the image. you need the other
    half to understand it.

    look into xor encryption for more information on the security of that..
    it's basically just a visual xor encryption
     
    0xception, Nov 9, 2005
    #2
    1. Advertising

  3. Jyothirmai <> wrote:

    > I have read in "Visual Cryptography", how an image can be
    > reconstructed "visually" by superimposing two shares. But I have not
    > understood how this can help in authenticating a user?


    It authenticates the user as "the person who has the other part of the
    picture".

    Juergen Nieveler
    --
    Linux: The smack in the face that Windows gripers have been begging for
    these past 10 years...
     
    Juergen Nieveler, Nov 9, 2005
    #3
    1. Advertising

Want to reply to this thread or ask your own question?

It takes just 2 minutes to sign up (and it's free!). Just click the sign up button to choose a username and then you can ask your own questions on the forum.
Similar Threads
  1. Lord Shaolin
    Replies:
    0
    Views:
    484
    Lord Shaolin
    Sep 28, 2003
  2. Dawnbell

    RSA cryptography

    Dawnbell, Nov 5, 2003, in forum: Computer Security
    Replies:
    3
    Views:
    546
    John D Loop
    Nov 6, 2003
  3. Rob Slade, doting grandpa of Ryan and Trevor

    REVIEW: "Practical Cryptography", Bruce Schneier/Niels Ferguson

    Rob Slade, doting grandpa of Ryan and Trevor, Nov 17, 2003, in forum: Computer Security
    Replies:
    0
    Views:
    599
    Rob Slade, doting grandpa of Ryan and Trevor
    Nov 17, 2003
  4. Rob Slade, doting grandpa of Ryan and Trevor

    REVIEW: "Cryptography and E-Commerce", Jon C. Graff

    Rob Slade, doting grandpa of Ryan and Trevor, Nov 28, 2003, in forum: Computer Security
    Replies:
    0
    Views:
    682
    Rob Slade, doting grandpa of Ryan and Trevor
    Nov 28, 2003
  5. Rob Slade, doting grandpa of Ryan and Trevor

    REVIEW: "RSA and Public Key Cryptography", Richard A. Mollin

    Rob Slade, doting grandpa of Ryan and Trevor, Dec 18, 2003, in forum: Computer Security
    Replies:
    0
    Views:
    545
    Rob Slade, doting grandpa of Ryan and Trevor
    Dec 18, 2003
Loading...

Share This Page