Browse > Article
http://dx.doi.org/10.6109/jkiice.2014.18.12.2899

Secure Keypad with Encrypted Input Message  

Seo, Hwa-Jeong (Department of Computer Engineering, Pusan National University)
Kim, Ho-Won (Department of Computer Engineering, Pusan National University)
Abstract
In this paper, we present method that verifies the validity of inputted message rather than showing last character on virtual keyboard. This encrypts password and valid input only can receive right feedback. This is implemented on Android phone and tested. This shows higher security than former method by 68.23% and accuracy shows 100%. This secure keypad is practical and secure so this can replace current input keypad without difficulty.
Keywords
Virtual Keypad; Secure Keypad; Encryption; Implementation;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Kwon, Sunghyuk, Donghun Lee, and Min K. Chung. "Effect of key size and activiation area on the performance of a regional error correction method in a touch-screen QWERTY keyborad." International Journal of Industrial Ergonomics 39.5(2009):888-893.   DOI   ScienceOn
2 Kohl, John T. "The use of encryption in Kerberos for network authentication." In Advances in Cryptology CRYPTO89 Proceedings, pp. 35-43. Springer New York, 1990.
3 Financial research center, "Guide for smartphone security", 2010.12.
4 Cai, Liang, and Hao Chen. "TouchLogger: inferring keystrokes on touch screen from smartphone motion." Proceedings of the 6th USENIX conference on Hot topics in security. USENIX Association, 2011.
5 Wiedenbeck, Susan, Jim Waters, Leonardo Sobrado, and Jean-Camille Birget. "Design and evaluation of a shouldersurfing resistant graphical password scheme." In Proceedings of the working conference on Advanced visual interfaces, pp. 177-184. ACM, 2006.
6 Daemen, Joan; Rijmen, Vincent (9/04/2003). "AES Proposal: Rijndael". National Institute of Standards and Technology. p. 1. Retrieved 21 February 2013.
7 Sidorenko, Andrey, and Berry Schoenmakers. "Concrete security of the Blum-Blum-Shub pseudorandom generator." In Cryptography and Coding, pp. 355-375. Springer Berlin Heidelberg, 2005.
8 Soo Min Lim, Hyoung Joong Kim, and Seong Kee Kim, "Designing Password Input System Resistant on Shoulder Surfing Attack with Statistical Analysis", Journal of The Institute of Electronics Engineers of Korea 2012, 49.9: 215-224.
9 Darer, Alexander. "Mini Project 2: A key-logger which infers keystrokes on a touch-screen keyboard from smartphone motion." (2013).
10 Cai, Liang, and Hao Chen. "On the practicality of motion based keystroke inference attack." Trust and Trustworthy Computing. Springer Berlin Heidelberg, 2012. 273-290.
11 Gharaibeh, Natheer. "The Impact of Customer Knowledge on the Security of E-Banking." International Journal of Computer Science and Security (IJCSS) 7.2 (2013): 81.
12 Asonov, D., Agrawal, R.: Keyboard acoustic emanations. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 3-11 (May 2004).
13 Vuagnoux, M., Pasini, S.: Compromising electromagnetic emanations of wired and wireless keyboards. In: Proceedings of the 18th Conference on USENIX Security.
14 Dongil Seo. "Privacy preserving technology." Journal of The Korea Institute of Information Security & Cryptology 16, no. 1 (2006): 40-48.
15 Gold, Steve. "Electronic countersurveillance strategies." Network Security 2013.2 (2013): 15-18.
16 Suo, Xiaoyuan, Ying Zhu, and G. Scott Owen. "Graphical passwords: A survey." In Computer Security Applications Conference, 21st Annual, pp. 10-pp. IEEE, 2005.
17 hyunggyu yang "Security on Smartphone keypad." Journal of The Korea Institute of Information Security & Cryptology 21, no. 7 (2011): 30-37.
18 Gjosteen, Kristian. "Comments on dual-ec-drbg/nist sp 800-90 draft december 2005." (2006).
19 Ehrsam, William F., Carl HW Meyer, John L. Smith, and Walter L. Tuchman. "Message verification and transmission error detection by block chaining." U.S. Patent 4,074,066, issued February 14, 1978.
20 Kaufman, C., Perlman, R., & Speciner, M (2002). Network Security. Upper Saddle River, NJ: Prentice Hall. Page 319 (2ndEd.).
21 Korean bank, "Reports on Domestic Internet banking", 2013.05.15.
22 Miller, George. "The magical number seven, plus or minus two: Some limits on our capacity for processing information." The psychological review63(1956):81-97.   DOI   ScienceOn
23 BIANCHI, Andrea, et al. The phone lock: audio and haptic shoulder-surfing resistant PIN entry methods for mobile devices. In: Proceedings of the fifth international conference on Tangible, embedded, and embodied interaction. ACM, 2011. p. 197-200.
24 Roth, Volker, Kai Richter, and Rene Freidinger. "A PIN-entry method resilient against shoulder surfing." In Proceedings of the 11th ACM conference on Computer and communications security, pp. 236-245. ACM, 2004.
25 Kumar, Manu, Tal Garfinkel, Dan Boneh, and Terry Winograd. "Reducing shoulder-surfing by using gaze-based password entry." In Proceedings of the 3rd symposium on Usable privacy and security, pp. 13-19. ACM, 2007.
26 Park, Kihong, Lee JunHwan, Cho HanJin"Countermeasure against Social Technologic Attack using Privacy Input-Detection" Korean content journal, 12, no. 5 (2012): 32-39.   과학기술학회마을   DOI   ScienceOn
27 Inseok, Kim. "Security enhancements for internet bank" Journal of The Korea Institute of Information Security & Cryptology 15, no. 4 (2005): 43-48.
28 Announcing the ADVANCED ENCRYPTION STANDARD (AES)". Federal Information Processing Standards Publication 197. United States National Institute of Standards and Technology (NIST). November 26, 2001. Retrieved October 2, 2012.