Open Access   Article Go Back

Authentication Mechanism using Encrypted One time Password (EOTP)

Amarjyoti Pathak1 , Sanjay Kumar Keot2 , Utpal Barmen3 , Panu Boro4

Section:Review Paper, Product Type: Journal Paper
Volume-04 , Issue-07 , Page no. 150-153, Dec-2016

Online published on Dec 09, 2016

Copyright © Amarjyoti Pathak, Sanjay Kumar Keot, Utpal Barmen, Panu Boro . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Amarjyoti Pathak, Sanjay Kumar Keot, Utpal Barmen, Panu Boro, “Authentication Mechanism using Encrypted One time Password (EOTP),” International Journal of Computer Sciences and Engineering, Vol.04, Issue.07, pp.150-153, 2016.

MLA Style Citation: Amarjyoti Pathak, Sanjay Kumar Keot, Utpal Barmen, Panu Boro "Authentication Mechanism using Encrypted One time Password (EOTP)." International Journal of Computer Sciences and Engineering 04.07 (2016): 150-153.

APA Style Citation: Amarjyoti Pathak, Sanjay Kumar Keot, Utpal Barmen, Panu Boro, (2016). Authentication Mechanism using Encrypted One time Password (EOTP). International Journal of Computer Sciences and Engineering, 04(07), 150-153.

BibTex Style Citation:
@article{Pathak_2016,
author = {Amarjyoti Pathak, Sanjay Kumar Keot, Utpal Barmen, Panu Boro},
title = {Authentication Mechanism using Encrypted One time Password (EOTP)},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2016},
volume = {04},
Issue = {07},
month = {12},
year = {2016},
issn = {2347-2693},
pages = {150-153},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=173},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=173
TI - Authentication Mechanism using Encrypted One time Password (EOTP)
T2 - International Journal of Computer Sciences and Engineering
AU - Amarjyoti Pathak, Sanjay Kumar Keot, Utpal Barmen, Panu Boro
PY - 2016
DA - 2016/12/09
PB - IJCSE, Indore, INDIA
SP - 150-153
IS - 07
VL - 04
SN - 2347-2693
ER -

           

Abstract

Authentication system is the mechanism of proving the access to authorize users only and to prevent the various security threats. In the various one time passwords based (OTP) systems are third party dependents such as mobile, emails etc. In this paper we will discuss about the problems associated with various authentication techniques and a proposed system which is independent of third party and highly secured.

Key-Words / Index Term

Network Security, Authentication, Public key, Private key, Cryptography, Encrypted one time password(EOTP)

References

[1]. R . L. Rivest, A. Shamir and L. Adleman, "On Digital Signatures and Public Key Cryptosystems", Technical Memo 82, Laboratory for Computer Science, Massachusetts Institute of Technology, April 1970.
[2]. National Institute of Standards and Technology (NIST) U.S.Department of Commerce: Electronic Authentication Guideline-Information Security, Special Publication 800-63-1, December 8,
[3]. W. E. Burr, D. F. Dodson, W. T. Polk. ElectronicAuthentication Guideline. Technical Report 800-63, National Institute of Standards andTechnology,2008..
[4]. CA.Managing strong Authentication: A Guide to Creating an Effective Management System, 2007. Dwiti Pandya, Khushboo Ram Narayan, Sneha Thakkar,Tanvi Madhekar nad B.S. Thakare, “An Overview of Various Authentication Methods and Protocols” in International Journal of Computer Applications (0975 – 8887) Volume 131 – No.9, December2015.
[5]. Geetanjali Choudhury and Jainul Abudin, “Modified Secure Two Way Authentication System in Cloud Computing Using Encrypted One Time Password” International Journal of Computer Science and Information Technologies, Vol. 5 (3) , 2014, 4077-4080.
[6]. Jainul Abudin, Sanjay Kumar Keot, Geetanjali Malakar, Nita Moni Borah and Mustafizur Rahman, “Modified RSA Public Key Cryptosystem Using Two Key Pairs” (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3) , 2014, 3548-3550.