首页> 外文会议>International Conference on Science in Information Technology >SMS authentication code generated by Advance Encryption Standard (AES) 256 bits modification algorithm and One time Password (OTP) to activate new applicant account
【24h】

SMS authentication code generated by Advance Encryption Standard (AES) 256 bits modification algorithm and One time Password (OTP) to activate new applicant account

机译:通过高级加密标准(AES)256位修改算法和一次性密码(OTP)生成的SMS身份验证代码来激活新申请人帐户

获取原文

摘要

Nowadays, it is highly necessary to give precautions aimed to prevent Netizen from creating fake accounts to do criminal offence. One of the means is to use authentication code where it contains activation message. This authentication code is generated through activation message combined with timestamp values which would further be used on One-time Password. Then, it would be encrypted using Advanced Encryption Standard cryptographic algorithm, the generated authentication code can only be used once within a limited time. Unfortunately though, in 2011 three researchers from several universities and Microsoft, Andrey Bogdanov from K.U. Leuven, Dimitri Khovratovich from Microsoft and Christian Reachberger from ENS Paris found a crack on AES encryption, thus requiring modification to enhance AES complexity in order to close the said crack. AES modification can be done on S-Box and ShiftRow, thus enabling their dynamics following the keys given. 256 bits AES is chosen because it contains more key combination and longer time to decrypt compared to other type of AES. After its modification is done, the next step would be tested with Avalanche Effect and Randomness Test, where good cryptographic algorithm would have Avalanche Effect values around 50% and able to pass 5 basic random tests in Randomness Test.
机译:如今,非常有必要采取预防措施,以防止网民创建伪造账户来犯罪。一种方法是使用包含激活消息的身份验证代码。该认证码是通过激活消息与时间戳值结合生成的,时间戳值将进一步用于一次性密码。然后,将使用高级加密标准加密算法对其进行加密,生成的身份验证代码只能在有限的时间内使用一次。但不幸的是,2011年,来自几所大学和微软的三名研究人员,来自K.U的Andrey Bogdanov。鲁汶,Microsoft的Dimitri Khovratovich和ENS Paris的Christian Reachberger发现了AES加密的裂缝,因此需要进行修改以增强AES复杂性才能解决上述问题。可以在S-Box和ShiftRow上进行AES修改,从而根据给定的键启用其动态功能。选择256位AES是因为与其他类型的AES相比,它包含更多的密钥组合和更长的解密时间。修改完成后,下一步将使用雪崩效应和随机性测试进行测试,其中好的密码算法将具有50%左右的雪崩效应值,并能够通过随机性测试中的5个基本随机测试。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号