SMS authentication code generated by Advance Encryption Standard (AES) 256 bits modification algorithm and One time Password (OTP) to activate new applicant account

E. Nugroho, Rizky Rachman Judhie Putra, Iman Muhamad Ramadhan
{"title":"SMS authentication code generated by Advance Encryption Standard (AES) 256 bits modification algorithm and One time Password (OTP) to activate new applicant account","authors":"E. Nugroho, Rizky Rachman Judhie Putra, Iman Muhamad Ramadhan","doi":"10.1109/ICSITECH.2016.7852629","DOIUrl":null,"url":null,"abstract":"Nowadays, it is highly necessary to give precautions aimed to prevent Netizen from creating fake accounts to do criminal offence. One of the means is to use authentication code where it contains activation message. This authentication code is generated through activation message combined with timestamp values which would further be used on One-time Password. Then, it would be encrypted using Advanced Encryption Standard cryptographic algorithm, the generated authentication code can only be used once within a limited time. Unfortunately though, in 2011 three researchers from several universities and Microsoft, Andrey Bogdanov from K.U. Leuven, Dimitri Khovratovich from Microsoft and Christian Reachberger from ENS Paris found a crack on AES encryption, thus requiring modification to enhance AES complexity in order to close the said crack. AES modification can be done on S-Box and ShiftRow, thus enabling their dynamics following the keys given. 256 bits AES is chosen because it contains more key combination and longer time to decrypt compared to other type of AES. After its modification is done, the next step would be tested with Avalanche Effect and Randomness Test, where good cryptographic algorithm would have Avalanche Effect values around 50% and able to pass 5 basic random tests in Randomness Test.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 2nd International Conference on Science in Information Technology (ICSITech)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSITECH.2016.7852629","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

Abstract

Nowadays, it is highly necessary to give precautions aimed to prevent Netizen from creating fake accounts to do criminal offence. One of the means is to use authentication code where it contains activation message. This authentication code is generated through activation message combined with timestamp values which would further be used on One-time Password. Then, it would be encrypted using Advanced Encryption Standard cryptographic algorithm, the generated authentication code can only be used once within a limited time. Unfortunately though, in 2011 three researchers from several universities and Microsoft, Andrey Bogdanov from K.U. Leuven, Dimitri Khovratovich from Microsoft and Christian Reachberger from ENS Paris found a crack on AES encryption, thus requiring modification to enhance AES complexity in order to close the said crack. AES modification can be done on S-Box and ShiftRow, thus enabling their dynamics following the keys given. 256 bits AES is chosen because it contains more key combination and longer time to decrypt compared to other type of AES. After its modification is done, the next step would be tested with Avalanche Effect and Randomness Test, where good cryptographic algorithm would have Avalanche Effect values around 50% and able to pass 5 basic random tests in Randomness Test.
通过AES (advanced Encryption Standard) 256位修改算法和OTP (One time Password)生成的短信认证码,用于激活新申请人账户
如今,非常有必要采取预防措施,以防止网民创建虚假账户进行刑事犯罪。其中一种方法是使用包含激活消息的身份验证代码。此身份验证代码是通过激活消息与时间戳值结合生成的,这些时间戳值将进一步用于一次性密码。然后,使用高级加密标准加密算法进行加密,生成的认证码在限定时间内只能使用一次。不幸的是,2011年,来自几所大学和微软的三位研究人员,鲁汶大学的Andrey Bogdanov,微软的Dimitri Khovratovich和巴黎高等教育学院的Christian Reachberger发现了AES加密的一个漏洞,因此需要修改以提高AES的复杂性,以关闭该漏洞。AES修改可以在S-Box和ShiftRow上完成,从而使它们的动态遵循给定的密钥。选择256位AES是因为与其他类型的AES相比,它包含更多的密钥组合和更长的解密时间。修改完成后,下一步将使用Avalanche Effect和Randomness Test进行测试,其中好的加密算法的Avalanche Effect值应该在50%左右,并且能够通过Randomness Test中的5个基本随机测试。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信