Anti-Phishing Structure Based On Visual Cryptography and RSA Algorithm

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2015 by IJETT Journal
Volume-20 Number-4
Year of Publication : 2015
Authors : Sayali Vaidya , Shreya Zarkar , Prof. Achal N. Bharambe , Arifa Tadvi , Tanashree Chavan
DOI :  10.14445/22315381/IJETT-V20P240

Citation 

Sayali Vaidya , Shreya Zarkar , Prof. Achal N. Bharambe , Arifa Tadvi , Tanashree Chavan "Anti-Phishing Structure Based On Visual Cryptography and RSA Algorithm", International Journal of Engineering Trends and Technology (IJETT), V20(4),209-213 Feb 2015. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract

Now-a-days online attacks have increased to a great extent and the most popular attack among them is phishing. Phishing can be basically defined as one kind of attack in which various attackers acquire the confidential and sensitive information of the victims. Thus, security in such cases should be very high to avoid the online attacks. Phishing steals the confidential information such as password, credit card information, etc which is carried out by fraudsters. So it is very much important for the users to identify the fake website and avoid falling prey to it. In this paper we have proposed a new approach named as “Anti-phishing structure based on visual cryptography and RSA algorithm" to solve the problem of phishing. Here an image based authentication using Visual Cryptography (VC) and the encryption algorithm is used. Visual cryptography is mainly done by splitting the original image into two shares one with user database and one with the server database. And the original image can be obtained only by both the shares of the image.

References

[1] Divya James and Mintu Philip, A Novel Anti-phishing framework based on visual Cryptography, 2012.
[2] M. Naor and A. Shamir, “Visual cryptography,” in Proc. EUROCRYPT, 1994, pp. 1–12.
[3] A. Shamir, .How to Share a Secret, Communication ACM, vol. 22, 1979, pp. 612-613.
[4] G. R. Blakley, Safeguarding Cryptographic Keys, Proceedings of AFIPS Conference, vol. 48, 1970, pp. 313-317.
[5] A. Menezes, P. Van Oorschot and S. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, FL, 1997.
[6] B. Borchert, .Segment Based Visual Cryptography, WSI Press, Germany, 2007.

Keywords
Phishing, Visual cryptography, Encryption Algorithm, RSA, Decryption, Visual Cryptographic Scheme.