scispace - formally typeset
Open AccessDOI

Securing One Time Password (OTP) for Multi-Factor Out-of-Band Authentication through a 128-bit Blowfish Algorithm

TLDR
An innovative modification of the Blowfish algorithm designed to capitalize on its strengths but supports 128-bits block size text input using dynamic selection encryption method and reduction of cipher function execution through randomly determined rounds is introduced.
Abstract
Authentication and cryptography have been used to address security issues on various online services. However, researchers discovered that even the most commonly used multi-factor out-of-band authentication mechanism was vulnerable to attacks and traditional crypto-algorithms were characterized to have some drawbacks making it crucial to choose desirable algorithms for a particular purpose. This study introduces an innovative modification of the Blowfish algorithm designed to capitalize on its strengths but supports 128-bits block size text input using dynamic selection encryption method and reduction of cipher function execution through randomly determined rounds. Experimentation results on 128-bit input text revealed significant performance improvements with utmost 5.91 % in terms of avalanche effect, 38.97 % for integrity, and 41.02 % in terms of execution time. Results also showed that the modification introduced extra security layer, thus, displaying higher complexity and stronger diffusion at faster execution time making it more difficult and complex for an unauthorized individual to decipher the information and desirable to be used for applications with multiple users respectively. This is a good contribution to the continuous developments in the field of information security particularly in cryptography and towards providing a secure OTP for multifactor out-of-band authentication.

read more

Citations
More filters
Journal ArticleDOI

Evaluation of Out-of-Band Channels for IoT Security

TL;DR: This paper explains the need for OOB channels and looks at one candidate bootstrapping protocol: Nimble out-of-band authentication for EAP (EAP-NOOB), which is implemented using near-field communication, quick response codes, and sound.
Journal ArticleDOI

Online Authentication Methods Used in Banks and Attacks Against These Methods

TL;DR: The main objective of the research is to identify the most common online authentication methods used widely in international banks and compare it with the methods used in six banks operating in UAE.

Introducing a Machine Learning Password Metric Based on EFKM Clustering Algorithm

TL;DR: A password strength metric using Enhanced Fuzzy K-Means clustering algorithm (EFKM) is introduced, able to recognize all the passwords from the OWASP as weak passwords only and regarding the leaked passwords, the metric recognizes almost the entire set of weak passwords.
Journal ArticleDOI

A Secured One Time Password Authentication Technique using (3, 3) Visual Cryptography Scheme

TL;DR: This paper presents a (3, 3) Visual Cryptographic Scheme (VCS) technique for OTP security that secures the generated OTP image by dividing it into three shares, and progressive visual cryptography was adopted to decrypt the retrieved OTP shares.
Journal ArticleDOI

Login Security Using One Time Password (OTP) Application with Encryption Algorithm Performance

TL;DR: System design to improve the security of the username and password data when logging into web applications by implementing the AES algorithm and Blowfish to encrypt the verification code and comparing the performance of the Blowfish and AES algorithm.
References
More filters
Journal ArticleDOI

A Comprehensive Evaluation of Cryptographic Algorithms

TL;DR: Cost and performance of popularly used cryptographic algorithms DES, 3DES, AES, RSA, RSA and blowfish are implemented and analyzed in detail to show an overall performance analysis, unlike only theoretical comparisons.
Proceedings ArticleDOI

Performance analysis of encryption algorithms for Information Security

TL;DR: Based on the experiments, it has been concluded that the Blowfish is the best performing algorithm among the algorithms chosen for implementation and throughput.
Journal ArticleDOI

Toward the design of adaptive selection strategies for multi-factor authentication

TL;DR: The detailed implementation of the proposed multi-factor authentication strategy, along with performance evaluation and user study, has been accomplished to establish its superiority over the existing frameworks.
Proceedings ArticleDOI

Security analysis of blowfish algorithm

TL;DR: The results obtained from the analysis of correlation coefficient showed that Blowfish algorithm gives a good nonlinear relation between plaintext and ciphertext while the results of avalanche effect indicate that the algorithm presents good avalanche effect from the second round.
Journal ArticleDOI

A Hybridized Model for Image Encryption through Genetic Algorithm and DNA Sequence

TL;DR: A hybridized model for encrypting images through a combination of Genetic Algorithm and DNA Sequence, which asserts the robustness of the algorithm against all kinds of attacks and thereby maintaining higher security.