A New Secure One-Time Password Algorithm for Mobile Applications

被引:0
作者
Elganzoury, Hisham S. [1 ]
Abdelhafez, Ahmed A. [2 ]
Hegazy, Abdelfattah A. [3 ]
机构
[1] Al Azhar Univ, Elect Engn Fac, Cairo, Egypt
[2] MTC, Elect Engn Fac, Cairo, Egypt
[3] AAST, Coll Comp & Informat Technol, Cairo, Egypt
来源
2018 35TH NATIONAL RADIO SCIENCE CONFERENCE (NRSC) | 2018年
关键词
One-time password; ransomware; traditional authentication; stream cipher algorithms; SHA-256;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The main goal of information security is to keep information out of unauthorized reach and modification. This can be achieved by developing policies, procedures, plans, and algorithms for achieving Confidentiality, Integrity and Authentication (CIA). Authentication assurance has become the most necessary target of information security as it is the first defense line in security systems, especially when Internet of Things (IoT) comes to the surface. IoT brings everything connected to the internet, this leads to more vulnerabilities and threats, such as authentication, integrity or authorization attacks. Traditional fixed passwords and keys make systems weaker than those use dynamically changing passwords and keys. In the past few months, Ransomware attackers exploited traditional authentication techniques on computer devices, as some attackers, first, had used some password cracking techniques to guess victim's password and then injected a trojan horse to encrypt victim's information. Without any doubt, using randomly changing strong passwords and authentication keys would make it much harder. One-time password generators that are fed with fixed data can be predictable as well. This paper introduces a new one-time password generator that is fed with randomly changing inputs. Then the proposed generator is implemented using Android-Based mobile device, after that, output is validated and assessed.
引用
收藏
页码:249 / 257
页数:9
相关论文
共 15 条
[1]  
[Anonymous], 2006, NIST SPEC PUBL
[2]  
[Anonymous], 2012, FIPS PUB, V180
[3]  
Boneh D, 1999, LECT NOTES COMPUT SC, V1592, P1
[4]   One-Time Password Authentication with Infinite Hash Chains [J].
Chefranov, Alexander G. .
NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS, AUTOMATION AND INDUSTRIAL ELECTRONICS, 2008, :283-286
[5]  
El-Booz Sheren A., 2015, 978150900275715 IEEE, P188
[6]  
Elganzoury HS, 2017, INT J SECUR APPL, V11, P77, DOI 10.14257/ijsia.2017.11.8.06
[7]  
Elganzoury Hisham S, 2015, INT J COMPUTER APPL, V123, P33
[8]  
Haller N. M., 1994, Proceedings Internet Society Symposium on Network and Distributed System Security 1994, P151
[9]  
Khoo Khoongming, 2006, LNCS, V3989, P239
[10]   A Design of One-Time Password Mechanism using Public Key Infrastructure [J].
Kim, Hyun-Chul ;
Lee, Hong-Woo ;
Lee, Kyung-Seok ;
Jun, Moon-Seog .
NCM 2008 : 4TH INTERNATIONAL CONFERENCE ON NETWORKED COMPUTING AND ADVANCED INFORMATION MANAGEMENT, VOL 1, PROCEEDINGS, 2008, :18-24