Analysis of the Strong Authentication and One Time Password (OTP) Market
Otp authentication scheme based on ECC
-
Upload
pooja-mehta -
Category
Engineering
-
view
338 -
download
3
Transcript of Otp authentication scheme based on ECC
OTP Authentication Scheme based on
Elliptic Curves for Internet of Things (IoT)
By:Ms. Pooja Mehta
GTU PG School-CDAC-BISAG,ME-IT Systems and Network Security
Gandhinagar
2
Abstract
Introduction
Proposed OTP Scheme Based on Identity Based Elliptic Curve
Future Work
References
Content
3
Abstract
End-to-end communication
Two-factor authentication mechanism
OTP for IoT
4
Introduction
5
Cont..
6
Proposed OTP Scheme Based On Identity Based Elliptic Curve
IBE-ECC to design a OTP scheme Proposed OTP Generation Scheme using Lamport’s OTP Algorithm
Hn(x) = H(Hn-1(Hn-2(Hn-3(….H(x)))))
7
Future Work
Requires lesser resources for operation as compared to the existing schemes with a smaller key size and lesser infrastructure
IRNSS is using Diffie – Hellman algorithm for encryption in satellite communication
Different prime numbers up to 2^128 bit
Alice and Bob choose Y and modulus p
Alice’s function : Y^A(mod p)
Bob’s function : Y^B(mod p)
Private key is : Y^AB = Y^BA (mod p)
Eve cannot compute Y^AB from p, Y, Y^A, Y^B
Diffie-Hellman
8
9
References http://www.msr-waypoint.com/enus/um/people/klauter/ieeefinal.pdf http://arstechnica.com/security/2015/10/how-the-nsa-can-break-trillions-of-encrypted-web-and-vpn-connections/ https://threatpost.com/prime-diffie-hellman-weakness-may-be-key-to-breaking-crypto/115069/ https://hackaday.com/tag/diffie-hellman/https://www.schneier.com/blog/archives/2015/05/the_logjam_and_.html https://weakdh.org/http://www.slate.com/blogs/future_tense/2015/10/16/researchers_say_the_common_diffie_hellman_key_exchange_is_vulnerable_to.html
10
Thank you !