Browse > Article
http://dx.doi.org/10.13089/JKIISC.2015.25.5.993

HB+ protocol-based Smart OTP Authentication  

Shin, Ji Sun (Sejong University)
Abstract
OTP(One time password) is widely used as an authentication method for financial and other security-sensitive transactions. OTP provides strong security since each password is used only one time while normal password-based authentications use passwords as long term secrets. However, OTP-based authentications relatively lack usability since they require users to hold an OTP card or generator. To overcome such a problem, smartphones start replacing OTP cards and such a method is called smart OTP. However, smart OTP inherits security vulnerabilities that smartphones have. In this paper, we propose a smart OTP authentication based on an extremely light authentication protocol called HB+. HB+ protocol is developed for low-cost devices and has small communication and computation costs. We present our solution and discuss its security, efficiency and practicality. Our contribution is providing a method to securely use smart OTP without losing its efficiency and usability.
Keywords
OTP; Smartphones; Security; Authentication;
Citations & Related Records
연도 인용수 순위
  • Reference
1 H. Gilbert, M. Robshaw and Y. Seurin, "An active attack against HB+- a probably secure lightweight authentication protocol," Electronics letters, vol. 41, pp.1169-1170, 2005.   DOI
2 H. Seo and H. Kim, "Lightweight cryptographic algorithm implementations for Internet of Things," Review of The Korea Institute of information Security & Cryptology, 25(2), pp.12-17, 2015.
3 E. Haselsteiner and K. Breitfuss, "Security in near field communication, strengths and weaknesses," Workshop on RFID Security Security RFIDSec, Jul. 2006.
4 A. Juels and S.A. Weis, "Authenticating pervasive devices with human protocols," Crypto, LNCS, vol.3621, pp. 293-308, Aug. 2005.
5 N.J. Hopper and M. Blum, "Secure human identification protocols," Asiacrypt, LNCS, vol.2248, p.52, Dec. 2001.
6 A. Blum, A. Kalai, and H. Wasserman, "Noise-Tolerant Learning, the Parity Problem, and the Statistical Query Model," Journal of the ACM 50, 4, pp.506-519, 2003.   DOI
7 J. Katz and J.S. Shin, "Parallel and concurrent security of the HB and HB+ protocols," Eurocrypt, LNCS, vol. 4004, pp.73-87, May. 2006.