One Time Password Generator System

Earlier static ID and Password are used which is vulnerable against eavesdropping and replay attack. To overcome this problem One Time Password technique is used which give different password each time. Earlier OTP is HOTP which is based on one way hash function SHA-1 and Ping Pong-128 stream cipher. In this paper we propose a method of generating OTP by using Genetic Algorithm with Elliptic Curve Cryptography. Keywords—Ant Colony Algorithm, Genetic Algorithm, Elliptic Curve, Blowfish Algorithm and EABC

[1]  Young Sil Lee,et al.  A study on efficient OTP generation using stream cipher with random digit , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).

[2]  Laurence R. Rilett,et al.  Heuristic shortest path algorithms for transportation applications: State of the art , 2006, Comput. Oper. Res..

[3]  Pengfei Guo,et al.  The enhanced genetic algorithms for the optimization design , 2010, 2010 3rd International Conference on Biomedical Engineering and Informatics.

[4]  Qing He,et al.  An improved ant colony optimization algorithm based on dynamically adjusting ant number , 2012, 2012 IEEE International Conference on Robotics and Biomimetics (ROBIO).

[5]  Zhiguo Liu,et al.  An Improved Ant Colony Optimization Algorithm Based on Pheromone Backtracking , 2011, 2011 14th IEEE International Conference on Computational Science and Engineering.

[6]  Tarik Yerlikaya,et al.  A new modified cryptosystem based on Menezes Vanstone elliptic curve cryptography algorithm that uses characters' hexadecimal values , 2013, 2013 The International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE).

[7]  David M'Raïhi,et al.  TOTP: Time-Based One-Time Password Algorithm , 2011 .

[8]  David M'Raïhi,et al.  HOTP: An HMAC-Based One-Time Password Algorithm , 2005, RFC.

[9]  F. Busetti Genetic algorithms overview , 2000 .

[10]  Andrew V. Goldberg,et al.  Computing the shortest path: A search meets graph theory , 2005, SODA '05.

[11]  Neha Jain,et al.  Modification of ant algorithm for Feature selection , 2009, 2009 International Conference on Control, Automation, Communication and Energy Conservation.

[12]  Xiangling Kuang,et al.  An optimization algorithm based on ant colony algorithm , 2012 .

[13]  Goldberg,et al.  Genetic algorithms , 1993, Robust Control Systems with Genetic Algorithms.

[14]  Novica Nosovic,et al.  Dijkstra's shortest path algorithm serial and parallel execution performance analysis , 2012, 2012 Proceedings of the 35th International Convention MIPRO.

[15]  Sjoerd van Egmond,et al.  Dynamic Ant Colony Optimization for the Traveling Salesman Problem , 2012 .

[16]  Hyotaek Lim,et al.  A Ping Pong Based One-Time-Passwords Authentication System , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.

[17]  Bayalagmaa Davaanaym,et al.  A PingPong One-Time-Password system in Java application , 2009 .

[18]  Hamid Mehdi EABC: Data Encryption Method Based on Circle , 2013 .

[19]  Ellis Horowitz,et al.  Fundamentals of Computer Algorithms , 1978 .