SlideShare a Scribd company logo
OTP Authentication
Scheme based on
Elliptic Curves for Internet
of Things (IoT)
By:
Ms. Pooja Mehta
GTU PG School-CDAC-BISAG,
ME-IT Systems and Network Security
Gandhinagar
2
 Abstract
 Introduction
 Proposed OTP Scheme Based on Identity Based Elliptic
Curve
 Future Work
 References
Content
3
Abstract
 End-to-end communication
 Two-factor authentication mechanism
 OTP for IoT
4
Introduction
5
Cont..
6
Proposed OTP Scheme Based On
Identity Based Elliptic Curve
 IBE-ECC to design a OTP scheme
 Proposed OTP Generation Scheme using Lamport’s
OTP Algorithm
Hn(x) = H(Hn-1(Hn-2(Hn-3(….H(x)))))
7
Future Work
 Requires lesser resources for operation as compared
to the existing schemes with a smaller key size and
lesser infrastructure
 IRNSS is using Diffie – Hellman algorithm for
encryption in satellite communication
 Different prime numbers up to 2^128 bit
 Alice and Bob choose Y and modulus p
 Alice’s function : Y^A(mod p)
 Bob’s function : Y^B(mod p)
 Private key is : Y^AB = Y^BA (mod p)
 Eve cannot compute Y^AB from p, Y, Y^A,
Y^B
Diffie-Hellman
8
9
References
 http://www.msr-
waypoint.com/enus/um/people/klauter/ieeefinal.pdf
 http://arstechnica.com/security/2015/10/how-the-nsa-can-
break-trillions-of-encrypted-web-and-vpn-connections/
 https://threatpost.com/prime-diffie-hellman-weakness-may-be-
key-to-breaking-crypto/115069/
 https://hackaday.com/tag/diffie-hellman/
https://www.schneier.com/blog/archives/2015/05/the_logjam_a
nd_.html
 https://weakdh.org/
http://www.slate.com/blogs/future_tense/2015/10/16/researcher
s_say_the_common_diffie_hellman_key_exchange_is_vulnerab
le_to.html
10
Thank
you !

More Related Content

PDF
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
PDF
Network Coding
PDF
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
PDF
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...
PPTX
A short introduction to Network coding
PDF
Cryptography Workbook
PDF
Cs6701 cryptography and network security
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
Network Coding
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...
A short introduction to Network coding
Cryptography Workbook
Cs6701 cryptography and network security

What's hot (13)

PDF
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
PDF
Yashasvi
PDF
Improving Cloud Efficiency using ECDH, AES & Blowfish Algorithms
PDF
Pg3426762678
PDF
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
PDF
G05124550
PDF
Fpga based encryption design using vhdl
PDF
Security for automation in Internet of Things by using one time password
PDF
581 517-525
PDF
IS Unit 3_Public Key Cryptography
PDF
M04302093096
PDF
IRJET - Wireless Transmission of Data using LDPC Codes based on Raspberry Pi
PDF
Iaetsd implementation of lsb image steganography system using edge detection
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
Yashasvi
Improving Cloud Efficiency using ECDH, AES & Blowfish Algorithms
Pg3426762678
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
G05124550
Fpga based encryption design using vhdl
Security for automation in Internet of Things by using one time password
581 517-525
IS Unit 3_Public Key Cryptography
M04302093096
IRJET - Wireless Transmission of Data using LDPC Codes based on Raspberry Pi
Iaetsd implementation of lsb image steganography system using edge detection
Ad

Viewers also liked (20)

PDF
Thi cong ctb ii danh cho sv-1
DOC
Proposal presensi bersistem rfid
PPTX
American fantasy drama
PDF
Avalon Media System Community Update Webinar
PPTX
Become a distributor pp
PPTX
Hybrid air conditioner
PDF
Voki
PDF
PPTX
My work experience
PPTX
EL FENÓMENO YOUTUBER
PDF
Query music informe unidad ii [modificado]
PPTX
American fantasy drama
PPTX
D.d.a.
PPTX
American fantasy drama
PPTX
Eord rotines
PPTX
Presentasi kk 2
PDF
Fpsbi questinnaire (3)
DOCX
G10 Science Q1
PPTX
Evaluation Question 3
PDF
X science 1st grading module
Thi cong ctb ii danh cho sv-1
Proposal presensi bersistem rfid
American fantasy drama
Avalon Media System Community Update Webinar
Become a distributor pp
Hybrid air conditioner
Voki
My work experience
EL FENÓMENO YOUTUBER
Query music informe unidad ii [modificado]
American fantasy drama
D.d.a.
American fantasy drama
Eord rotines
Presentasi kk 2
Fpsbi questinnaire (3)
G10 Science Q1
Evaluation Question 3
X science 1st grading module
Ad

Similar to Otp authentication scheme based on ECC (20)

PDF
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
DOC
Embedded Linux dev
PPTX
Hybrid encryption ppt
PDF
A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...
DOC
Lightweight secure scheme for detecting provenance forgery and packet drop at...
PDF
G05215356
PDF
Secure Checkpointing Approach for Mobile Environment
PPTX
A neural cryptography approach for digital image security using vigenere ciph...
PPT
Introduction to SMPC
PPT
Introduction to smpc
PDF
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
PDF
New Technique Using Multiple Symmetric keys for Multilevel Encryption
PPT
Internet of Things (IoT) Security using stream cipher.ppt
PPT
Marek Suplata Projects
PDF
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
PDF
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
PDF
Ciphertext Policy Attribute Based Encryption with Anonymous Access Policy
PDF
Ciphertext policy Attribute based Encryption with anonymous access policy
PDF
Ciphertext policy Attribute based Encryption with anonymous access policy
PDF
Ciphertext policy Attribute based Encryption with anonymous access policy
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
Embedded Linux dev
Hybrid encryption ppt
A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...
Lightweight secure scheme for detecting provenance forgery and packet drop at...
G05215356
Secure Checkpointing Approach for Mobile Environment
A neural cryptography approach for digital image security using vigenere ciph...
Introduction to SMPC
Introduction to smpc
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
New Technique Using Multiple Symmetric keys for Multilevel Encryption
Internet of Things (IoT) Security using stream cipher.ppt
Marek Suplata Projects
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
Ciphertext Policy Attribute Based Encryption with Anonymous Access Policy
Ciphertext policy Attribute based Encryption with anonymous access policy
Ciphertext policy Attribute based Encryption with anonymous access policy
Ciphertext policy Attribute based Encryption with anonymous access policy

More from POOJA MEHTA (7)

PPTX
Data Validation for Business Continuity Planning
PPTX
Memory Handling and Garbage Collection in Python
PPTX
Fault tolerance in Big Data
PPT
Computer organization and architecture
PPTX
The optimization and implementation of iptables rules set
PPTX
Deadlock Detection
PPTX
Network Data Representation
Data Validation for Business Continuity Planning
Memory Handling and Garbage Collection in Python
Fault tolerance in Big Data
Computer organization and architecture
The optimization and implementation of iptables rules set
Deadlock Detection
Network Data Representation

Recently uploaded (20)

PPTX
Geodesy 1.pptx...............................................
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
PPT on Performance Review to get promotions
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
OOP with Java - Java Introduction (Basics)
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
DOCX
573137875-Attendance-Management-System-original
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
Welding lecture in detail for understanding
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Sustainable Sites - Green Building Construction
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Geodesy 1.pptx...............................................
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Operating System & Kernel Study Guide-1 - converted.pdf
R24 SURVEYING LAB MANUAL for civil enggi
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPT on Performance Review to get promotions
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
UNIT-1 - COAL BASED THERMAL POWER PLANTS
OOP with Java - Java Introduction (Basics)
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
573137875-Attendance-Management-System-original
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Internet of Things (IOT) - A guide to understanding
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Welding lecture in detail for understanding
Model Code of Practice - Construction Work - 21102022 .pdf
Sustainable Sites - Green Building Construction
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx

Otp authentication scheme based on ECC