PingPong-128, A New Stream Cipher for Ubiquitous Application
ICCIT '07 Proceedings of the 2007 International Conference on Convergence Information Technology
AN INTELLIGENT SECURITY AGENT FOR A RELIABLE CIPHER SYSTEM USING PINGPONG
Cybernetics and Systems
Efficient implementation of pseudorandom functions for electronic seal protection protocols
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Hi-index | 0.00 |
The ID and password is the most classical method among authentication techniques on the internet, and is performed more easily and successfully than other methods. However, it is a vulnerable method against attacks such as eavesdropping or replay attack. To overcome this problem, OTP technique is used. The most popular OTP is HOTP algorithm, which is based on one-way hash function SHA-l. It is a cornerstone of initiative for Open Authentication (OATH), it was published as an information IETF RFC 4226 in December 2005. As recent researches show the weakness of the hash function, to overcome this problem we need a new algorithm to replace them. In this paper we propose a method of creating one time password key using Ping Pong-128 stream cipher. Ping Pong is bit based stream cipher and it is designed with both security and efficiency in mind to satisfy the need for lightweight algorithm. We also use random digit, which it safe from attacks to creating a variable with the digit of the OTP.