Otp authentication scheme based on ECC

10
OTP Authentication Scheme based on Elliptic Curves for Internet of Things (IoT) By: Ms. Pooja Mehta GTU PG School-CDAC-BISAG, ME-IT Systems and Network Security Gandhinagar

Transcript of Otp authentication scheme based on ECC

Page 1: Otp authentication scheme based on ECC

OTP Authentication Scheme based on

Elliptic Curves for Internet of Things (IoT)

By:Ms. Pooja Mehta

GTU PG School-CDAC-BISAG,ME-IT Systems and Network Security

Gandhinagar

Page 2: Otp authentication scheme based on ECC

2

Abstract

Introduction

Proposed OTP Scheme Based on Identity Based Elliptic Curve

Future Work

References

Content

Page 3: Otp authentication scheme based on ECC

3

Abstract

End-to-end communication

Two-factor authentication mechanism

OTP for IoT

Page 4: Otp authentication scheme based on ECC

4

Introduction

Page 5: Otp authentication scheme based on ECC

5

Cont..

Page 6: Otp authentication scheme based on ECC

6

Proposed OTP Scheme Based On Identity Based Elliptic Curve

IBE-ECC to design a OTP scheme Proposed OTP Generation Scheme using Lamport’s OTP Algorithm

Hn(x) = H(Hn-1(Hn-2(Hn-3(….H(x)))))

Page 7: Otp authentication scheme based on ECC

7

Future Work

Requires lesser resources for operation as compared to the existing schemes with a smaller key size and lesser infrastructure

IRNSS is using Diffie – Hellman algorithm for encryption in satellite communication

Different prime numbers up to 2^128 bit

Page 8: Otp authentication scheme based on ECC

Alice and Bob choose Y and modulus p

Alice’s function : Y^A(mod p)

Bob’s function : Y^B(mod p)

Private key is : Y^AB = Y^BA (mod p)

Eve cannot compute Y^AB from p, Y, Y^A, Y^B

Diffie-Hellman

8

Page 9: Otp authentication scheme based on ECC

9

References http://www.msr-waypoint.com/enus/um/people/klauter/ieeefinal.pdf http://arstechnica.com/security/2015/10/how-the-nsa-can-break-trillions-of-encrypted-web-and-vpn-connections/ https://threatpost.com/prime-diffie-hellman-weakness-may-be-key-to-breaking-crypto/115069/ https://hackaday.com/tag/diffie-hellman/https://www.schneier.com/blog/archives/2015/05/the_logjam_and_.html https://weakdh.org/http://www.slate.com/blogs/future_tense/2015/10/16/researchers_say_the_common_diffie_hellman_key_exchange_is_vulnerable_to.html

Page 10: Otp authentication scheme based on ECC

10

Thank you !