DOI QR코드

DOI QR Code

An Extension of Firmware-based LFSR One-Time Password Generators

  • HoonJae Lee (Dept. Information Security, Dongseo University) ;
  • ByungGook Lee (Dept. Computer Engineering, Dongseo University)
  • Received : 2024.04.10
  • Accepted : 2024.04.21
  • Published : 2024.06.30

Abstract

In this paper, we propose two 127-bit LFSR (Linear Feedback Shift Register)-based OTP (One-Time Password) generators. One is a 9-digit decimal OTP generator with thirty taps, while the other is a 12-digit OTP generator with forty taps. The 9-digit OTP generator includes only the positions of Fibonacci numbers to enhance randomness, whereas the 12-digit OTP generator includes the positions of prime numbers and odd numbers. Both proposed OTP generators are implemented on an Arduino module, and randomness evaluations indicate that the generators perform well across six criteria and are straightforward to implement with Arduino.

Keywords

Acknowledgement

This work was supported by Dongseo University, "Dongseo Cluster Project" Research Fund of 2023 (DSU-20230004).

References

  1. Baek, Mi Yeon, "Security Enhancement Measures for Electronic Financial Transactions and Current Status of OTP (One Time Password) Usage," Payment and Information Technology, pp. 71-100, Apr. 2006.
  2. T. Tsuji, T. Kamioka, and A. Shirnizu, "Simple and secure password authentication protocol," ver. 2(SAS-2), IEICE Tech. Rep., OIS 2003-30, vol. 102, no. 314, Sep. 2002.
  3. Kim, Woo Bin, and Kim, Ki Cheon, "Encryption Key Transformation Using OTP Algorithm," Proceedings of the Korea Institute of Communication Sciences Academic Conference, pp. 155-156, 2015.
  4. M. L. Das, A. Saxena, V. P. Gulati, "A dynamic ID-based remote user authentication scheme", IEEE Trans. Consumer Electron., vol. 50, no.2, pp. 629-631, Feb. 2004. https://doi.org/10.1109/TCE.2004.1309441
  5. H. Y. Chien, C. H. Chen, "A remote authentication scheme preserving user anonymity," IEEE AINA'05, vol. 2, pp. 245-248, 2005.
  6. A. Menezes, Handbook of Applied Cryptography, CRC Press, 2001. https://doi.org/10.1109/AINA.2005.54
  7. G Goos, J Hartmanis and J van Leeuwen, 2017 lecture on data security, Modern Cryptology, in Theory and Practice, vol 3 (Springer).
  8. Arisman, Mahyuddin K M Nasution, and Syahril Efendi, "Enhancement of OTP stream cipher algorithm based on bit separation," Journal of Physics: Conference Series, Vol. 1339 (2019). doi:10.1088/1742-6596/1339/1/012010
  9. Soonduck Yoo, " Comparative analysis of blockchain trilemma," International Journal of Advanced Smart Convergence, Vol. 12, No. 1, Mar. 2023. http://dx.doi.org/10.7236/IJASC.2023.12.1.41
  10. Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Ki-Hwan Kim, Young-Sil Lee,Hoon Jae Lee, " Summary of Maritime Cyber Attacks and Risk Management," International Journal of Advanced Smart Convergence, Vol. 11, No. 3, Sep. 2022. http://doi.org/10.7236/IJASC.2022.11.3.7