Eldo P. Elias, A. Santhanavijayan, B. Janet, Kumar R Joshua Arul
{"title":"基于ECC密钥交换的OTP系统","authors":"Eldo P. Elias, A. Santhanavijayan, B. Janet, Kumar R Joshua Arul","doi":"10.1109/IC3IOT53935.2022.9768019","DOIUrl":null,"url":null,"abstract":"The user id and corresponding passwords are generally used for identifying a user in cyberspace. However, this information is not enough to prove that the right person has provided these details. This is where authentication has a role to play. Authentication is the process of proving the identity of a user on a computer system. Identification is used to recognize a person or thing's identity, while authentication is the procedure for verifying that identity. The system can ensure that the right person accesses its resources through authentication. The user has to give some credentials that no one else possesses. It is sometimes called multifactor authentication. One form of multifactor authentication is the one time password (OTP). While using critical services like e-commerce, the user is authenticated using OTP before making the actual payment. Upon receiving the OTP, the user enters it on the client site, which is sent to the server for validation. Submitting OTP to the server through the open network makes it prone to all sorts of attacks that can happen on the open network. An OTP system based on Elliptic Curve Cryptography (ECC) is proposed to avoid sending OTP through an open network. Through the ECC key exchange mechanism, OTP can be generated simultaneously at the server-side and client-side. Hence it is not required to send OTP back to the server for verification. The client itself can verify the OTP without sending it to the server. Not only that, OTP can be used as a session key for all the transactions in the session.","PeriodicalId":430809,"journal":{"name":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"OTP System Based on ECC Key Exchange\",\"authors\":\"Eldo P. Elias, A. Santhanavijayan, B. Janet, Kumar R Joshua Arul\",\"doi\":\"10.1109/IC3IOT53935.2022.9768019\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The user id and corresponding passwords are generally used for identifying a user in cyberspace. However, this information is not enough to prove that the right person has provided these details. This is where authentication has a role to play. Authentication is the process of proving the identity of a user on a computer system. Identification is used to recognize a person or thing's identity, while authentication is the procedure for verifying that identity. The system can ensure that the right person accesses its resources through authentication. The user has to give some credentials that no one else possesses. It is sometimes called multifactor authentication. One form of multifactor authentication is the one time password (OTP). While using critical services like e-commerce, the user is authenticated using OTP before making the actual payment. Upon receiving the OTP, the user enters it on the client site, which is sent to the server for validation. Submitting OTP to the server through the open network makes it prone to all sorts of attacks that can happen on the open network. An OTP system based on Elliptic Curve Cryptography (ECC) is proposed to avoid sending OTP through an open network. Through the ECC key exchange mechanism, OTP can be generated simultaneously at the server-side and client-side. Hence it is not required to send OTP back to the server for verification. The client itself can verify the OTP without sending it to the server. Not only that, OTP can be used as a session key for all the transactions in the session.\",\"PeriodicalId\":430809,\"journal\":{\"name\":\"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)\",\"volume\":\"69 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-03-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IC3IOT53935.2022.9768019\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3IOT53935.2022.9768019","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The user id and corresponding passwords are generally used for identifying a user in cyberspace. However, this information is not enough to prove that the right person has provided these details. This is where authentication has a role to play. Authentication is the process of proving the identity of a user on a computer system. Identification is used to recognize a person or thing's identity, while authentication is the procedure for verifying that identity. The system can ensure that the right person accesses its resources through authentication. The user has to give some credentials that no one else possesses. It is sometimes called multifactor authentication. One form of multifactor authentication is the one time password (OTP). While using critical services like e-commerce, the user is authenticated using OTP before making the actual payment. Upon receiving the OTP, the user enters it on the client site, which is sent to the server for validation. Submitting OTP to the server through the open network makes it prone to all sorts of attacks that can happen on the open network. An OTP system based on Elliptic Curve Cryptography (ECC) is proposed to avoid sending OTP through an open network. Through the ECC key exchange mechanism, OTP can be generated simultaneously at the server-side and client-side. Hence it is not required to send OTP back to the server for verification. The client itself can verify the OTP without sending it to the server. Not only that, OTP can be used as a session key for all the transactions in the session.