Abstract

Abstract This article aims to elaborate on a few strategies designed for validating data encoded as a QR code. As the use-cases for such validation schemes vary widely as the demand for such practices is continuously increasing, the present article will represent a comparative study of checksum, hashing, as well as asymmetric encryption algorithms for the offline validation of claims transmitted through the payload of the exchanged data. Results are evaluated based on different criteria impacting the reliability, such as the size of the QR code and the resulting security.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call