Cite

This article aims to elaborate on a few strategies designed for validating data encoded as a QR code. As the use-cases for such validation schemes vary widely as the demand for such practices is continuously increasing, the present article will represent a comparative study of checksum, hashing, as well as asymmetric encryption algorithms for the offline validation of claims transmitted through the payload of the exchanged data. Results are evaluated based on different criteria impacting the reliability, such as the size of the QR code and the resulting security.