Developing and testing a visual hash scheme

M. M. Olembo, T. Kilian, S. Stockhardt, A. Hülsing, M. Volkamer

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

Abstract

Users find comparing long meaningless strings of alphanumeric characters difficult, yet they have to carry out this task when comparing cryptographic hash values for https certificates and PGP keys, or in the context of electronic voting. Visual hashes - where users compare images rather than strings - have been proposed as an alternative. With the visual hashes available in literature, however, people are unable to sufficiently distinguish more than 30 bits. Obviously, this does not provide adequate security against collision attacks. Our goal is to improve the situation: a visual hash scheme was developed, evaluated through pilot user studies and improved iteratively, leading to CLPS, which encodes 60 distinguishable bits using Colours, Patterns and Shapes. In the final user study, participants attained an average accuracy rate of 97% when comparing two visual hash images, with one placed above the other. CLPS was further tested in two follow-up studies, simulating https certificate validation and verifying in remote electronic voting. The results of this work and their implications for practical applications of visual hash schemes are discussed.

Original languageEnglish
Title of host publicationProceedings of the European Information Security Multi-Conference, EISMC 2013, 8-10 may 2013, Portugal, Lisbon
PublisherPlymouth University, Centre for Security, Communications & Network Research
Pages91-100
Number of pages10
ISBN (Print)9781841023458
Publication statusPublished - 2013
Externally publishedYes
EventEuropean Information Security Multi-Conference (EISMC 2013), May 8-10, 2013, Lisbon, Portugal - Lisbon, Portugal
Duration: 8 May 201310 May 2013

Conference

ConferenceEuropean Information Security Multi-Conference (EISMC 2013), May 8-10, 2013, Lisbon, Portugal
Abbreviated titleEISMC 2013
CountryPortugal
CityLisbon
Period8/05/1310/05/13

Keywords

  • Hash function
  • Security
  • Usability
  • Visual hash

Fingerprint Dive into the research topics of 'Developing and testing a visual hash scheme'. Together they form a unique fingerprint.

Cite this