Open AccessDOI
Securing One Time Password (OTP) for Multi-Factor Out-of-Band Authentication through a 128-bit Blowfish Algorithm
Ariel Roy L. Reyes,Enrique D. Festijo,Ruji P. Medina +2 more
- Vol. 10, Iss: 1
TLDR
An innovative modification of the Blowfish algorithm designed to capitalize on its strengths but supports 128-bits block size text input using dynamic selection encryption method and reduction of cipher function execution through randomly determined rounds is introduced.Abstract:
Authentication and cryptography have been used to address security issues on various online services. However, researchers discovered that even the most commonly used multi-factor out-of-band authentication mechanism was vulnerable to attacks and traditional crypto-algorithms were characterized to have some drawbacks making it crucial to choose desirable algorithms for a particular purpose. This study introduces an innovative modification of the Blowfish algorithm designed to capitalize on its strengths but supports 128-bits block size text input using dynamic selection encryption method and reduction of cipher function execution through randomly determined rounds. Experimentation results on 128-bit input text revealed significant performance improvements with utmost 5.91 % in terms of avalanche effect, 38.97 % for integrity, and 41.02 % in terms of execution time. Results also showed that the modification introduced extra security layer, thus, displaying higher complexity and stronger diffusion at faster execution time making it more difficult and complex for an unauthorized individual to decipher the information and desirable to be used for applications with multiple users respectively. This is a good contribution to the continuous developments in the field of information security particularly in cryptography and towards providing a secure OTP for multifactor out-of-band authentication.read more
Citations
More filters
Journal ArticleDOI
Evaluation of Out-of-Band Channels for IoT Security
TL;DR: This paper explains the need for OOB channels and looks at one candidate bootstrapping protocol: Nimble out-of-band authentication for EAP (EAP-NOOB), which is implemented using near-field communication, quick response codes, and sound.
Journal ArticleDOI
Online Authentication Methods Used in Banks and Attacks Against These Methods
TL;DR: The main objective of the research is to identify the most common online authentication methods used widely in international banks and compare it with the methods used in six banks operating in UAE.
Introducing a Machine Learning Password Metric Based on EFKM Clustering Algorithm
Omar Almousa,Hazem Migdady +1 more
TL;DR: A password strength metric using Enhanced Fuzzy K-Means clustering algorithm (EFKM) is introduced, able to recognize all the passwords from the OWASP as weak passwords only and regarding the leaked passwords, the metric recognizes almost the entire set of weak passwords.
Journal ArticleDOI
A Secured One Time Password Authentication Technique using (3, 3) Visual Cryptography Scheme
Abikoye Oluwakemi Christiana,Akande Noah Oluwatobi,Garuba Ayomide Victory,Ogundokun Roseline Oluwaseun +3 more
TL;DR: This paper presents a (3, 3) Visual Cryptographic Scheme (VCS) technique for OTP security that secures the generated OTP image by dividing it into three shares, and progressive visual cryptography was adopted to decrypt the retrieved OTP shares.
Journal ArticleDOI
Login Security Using One Time Password (OTP) Application with Encryption Algorithm Performance
TL;DR: System design to improve the security of the username and password data when logging into web applications by implementing the AES algorithm and Blowfish to encrypt the verification code and comparing the performance of the Blowfish and AES algorithm.
References
More filters
Journal ArticleDOI
A Comprehensive Evaluation of Cryptographic Algorithms
TL;DR: Cost and performance of popularly used cryptographic algorithms DES, 3DES, AES, RSA, RSA and blowfish are implemented and analyzed in detail to show an overall performance analysis, unlike only theoretical comparisons.
Proceedings ArticleDOI
Performance analysis of encryption algorithms for Information Security
A. Ramesh,A. Suruliandi +1 more
TL;DR: Based on the experiments, it has been concluded that the Blowfish is the best performing algorithm among the algorithms chosen for implementation and throughput.
Journal ArticleDOI
Toward the design of adaptive selection strategies for multi-factor authentication
TL;DR: The detailed implementation of the proposed multi-factor authentication strategy, along with performance evaluation and user study, has been accomplished to establish its superiority over the existing frameworks.
Proceedings ArticleDOI
Security analysis of blowfish algorithm
TL;DR: The results obtained from the analysis of correlation coefficient showed that Blowfish algorithm gives a good nonlinear relation between plaintext and ciphertext while the results of avalanche effect indicate that the algorithm presents good avalanche effect from the second round.
Journal ArticleDOI
A Hybridized Model for Image Encryption through Genetic Algorithm and DNA Sequence
TL;DR: A hybridized model for encrypting images through a combination of Genetic Algorithm and DNA Sequence, which asserts the robustness of the algorithm against all kinds of attacks and thereby maintaining higher security.
Related Papers (5)
DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis
Jawahar Thakur,Nagesh Kumar +1 more