SlideShare a Scribd company logo
1 of 4
Download to read offline
Online applications using
strong authentication with OTP grid cards
Bayalagmaa Davaanaym)
Department of Professional
Soyol Erdem University
Ulaanbaatar,48/88,Mongolia
E-mail: bayalag2007@yahoo.com
Abstract—Several techniques using technology based on
biometrics, passwords, certificates, and smart cards can be used
for user authentication in the accessible network system. One of
the most popular areas in OTP authentication protocol can be
used for an authenticating user by a server. Focusing on methods
that are used to implement strong user authentication for online-
consumer identities, this paper aims to distill a comprehensive
view of strong user authentication by examining its concepts,
implementation approaches, and challenges/additional concerns
at the architectural level. It discusses effective solution
approaches, overall architecture designs, and emerging
developments. Authentication system over Grid card allows you
to change the policy and define the entropy of a card and its
strength. Grid cards also may be set to expire with greater
frequency — requiring the issuance of new cards — to increase
security.
Keywords—One time password, grid card authentication
I. INTRODUCTION
Passwords as a means of authentication have long reached
their expiry date. Web-based user-authentication systems
without compromising usability and ubiquity, when the
Internet is accessed mostly through a browser that has limited
access to the client environment and hardware devices. The
most common solution approaches that are used today involve,
in more generalized terms, various forms of enhanced shared-
secret and multifactor authentication.
Enhanced shared-secret authentication refers to extensions
of conventional knowledge-based (single-factor)
authentication—for example, additional passwords, site keys,
preregistered graphical icons to support mutual authentication,
challenge-response, randomized code selections that are based
on input patterns, CAPTCHA, and so on.
Multifactor authentication refers to a compound
implementation of two or more classes of human-
authentication factors: Something known to only the user—
Knowledge-based (for example, password, pass phrase, shared
secrets, account details and transaction history, PIN,
CAPTCHA, and so on).
Something held by only the user—Possession-based (for
example, security token, smart card, shared soft tokens, mobile
device, and so on).
Something inherent to only the user—Biological or
behavior biometric traits (for example, facial recognition,
fingerprint, voice recognition, keystroke dynamics, signature,
and so on).
For example, many enterprise extranet/VPN solutions today
require both simple credentials (something known, such as ID
and password) and hardware tokens (something held, such as
secure ID with time-based one-time password generators, smart
cards that use embedded PKI solutions, and so on) in order to
gain access. The combination of the two "known" and "held"
factors makes up the multifactor authentication method, and
significantly improves the authentication strength, as it curtails
the threat of stolen digital identities.
In practice, however, there is a wealth of implementations,
methods, and permutations of them—all with varying trade-
offs in terms of cost, complexity, usability, and security.
It is standard practice to achieve strong authentication by
requiring the communicating party to provide two different
pieces of authentication of different types: in this case these are
the user password (something known) and the one-time
password (something possessed).
Fig. 1. Example of a figure caption. (figure caption)
TABLE I.
Type device
OTP PKI (HW) Biometry
Strong authentication *
Encryption *
Digital signature *
Non repudiation *
Strong link with the
user *
a.
* Biometry type Fingerprinting
b.
In Mongolia, online banking and online services are
increasing. Online banking (or Internet banking) that allows
customers to conduct financial transactions on a secure
website. However, with increased convenience, the threats of
online banking fraud have also become a greater concern.
Customer confidence and loyalty to a bank with online banking
services depend greatly on the protection against banking fraud
and identity theft. But Most of the banks are single password
authentication is still in use, it by itself is not considered secure
enough for online banking in Mongolia. Goal of this paper that
improve online applications secure in Mongolia with grid card
authentication system. The grid card is functionally equivalent
to the electronic tokens commonly used for applications such
as online banking.
Companies and banks have been introducing a variety of
methods to improve the authentication of customers. For
examples, some banks are distributing special cards to their
customers that resemble grid cards. During authentication,
users are prompted with column and row numbers, and they
have to provide the secret number contained in the
corresponding cell. This provides a second form of
authentication, something you have, along with the traditional
username and password.
Since an imposter does not have the security card, they
are not able to look-up the correct information in each cell
when they attempt to fraudulently access the user account.
Chapter 2 of this study explains the grid card authentication
related study, and chapter 3 presents a password key creation
method through extraction of grid card with OTP. Grid card
authentication is strong authentication function, it can create
temporary one time password keys. Chapter 4 carries out a
simulation adopting the presented one time password key using
grid card algorithm, and lastly, draws a conclusion.
II. RELATED WORKS
A. Grid card authentication
The multi-factor authentication system requires a password,
plus the grid that’s often printed on the back of a special card
and salt. When a user logs in using their ID and password ,
they are prompted for a random cell in the grid. The user then
enters the correct combination of numbers and letters in that
cell and is granted access.
Each grid card is unique and carries a serial number, so
every user can be uniquely identified and authenticated. Each
time a user is asked to authenticate they are presented with a
different challenge requiring them to validate via a different set
of grid coordinates. The coordinate request changes for each
authentication challenge. In this scenario, the challenge
presents the user with coordinates such as B2, F5 and J4. The
user refers to their unique grid card to provide the information
from the requested cells: 18, H1, X8.
Challenge Generation Algorithms
After enabling grid authentication, Authentication system
allows you to choose between two challenge-generation
algorithms. Random Challenge algorithm (default) picks cells
randomly when creating a challenge. The process for creating a
challenge does not depend on previous challenges. Random
Challenge algorithm that choose DRBG. Deterministic
Random Bit Generators (also known as Pseudo Random
Number Generators – PRNGs) take input (a seed) from either
the noise source(s) or the conditioning step and produce
outputs of random values
Least-Used Cells Challenge
This algorithm uses one or more least-used cells (set in
policy) in every challenge. By generating challenges using the
least-used cells from a user’s grid, it becomes more difficult for
an attacker who has previously viewed some successful
authentications to correctly respond to the challenge.
B. One Time Password
One Time Password (OTP) is a password system where
passwords can only be used once, and the user has to be
authenticated with a new password key each time. It is a
password key creation method that makes it extremely difficult
to predict the next password key based on the current
password. A new password key is created in its own device
constantly after a set period of time and the user has to enter a
new password every time he or she uses the system, so it
prevents exposure of the user’s password due to hacking or the
user’s mistake. OTP has much stronger security because the
user has to enter a newly created password key even if his or
password is exposed. Most OTPs’ password key creation
algorithms are based on one-way functions. For example,
S/Key systems (RFC1760) in almost all UNIX OS use such
functions. The OTP is standardized by the IETF, and
standardized again by verification related companies, and the
RSA and OATH are carrying out the most competitive
standardizations.
III. CREATION OF PASWORD KEYS USING GRID CARD
Normally when a user requests authentication, even after
first contact, certain important services confirm passwords
again. However, as explained above, the existing password
system has many weaknesses, and a solution for this is one
time password mechanism.
The elements of one time password mechanism are a token
included in a security/password algorithm or one time
password key creating device, a authentication server and a
authentication client. Since the one time password mechanism
is a program, it is programmed to be random, but the
randomness breaks after a certain period of time and passwords
become predictable so one time password mechanisms have the
disadvantage of having to exchange OTP modules after a
certain period of time.
In order to overcome such weaknesses, this study presents a
method of creating one time password keys in OTP Clients
using grid card characteristics. On characteristics of this study
that should be focused on is that the OTP system is not
positioned in the OTP Server.
The password key creation process starts with a user logs in
using their ID and password
send to request to server. Then next process shows the
randomly prime number of coordinate challenge selecting and
reply to client. The process of creating a combination of
permutation using the selected prime number by order, and
creation of coordinate challenge using S/Key authentication
scheme.
OTP password is a secret key that salt words and
information in the corresponding cells from the unique grid
card they possess.
Figure1. Grid card authentication system with salt passwords
This secret key can either be provided by the user, or can be
generated by a computer. In case we choose salt is a random
string of data used to modify a password hash. Salt can be
added to the hash to prevent a collision by uniquely identifying
a user's password, even if another user in the system has
selected the same password. Salt can also be added to make it
more difficult for an attacker to break into a system by using
password hash-matching strategies because adding salt to a
password hash prevents an attacker from testing known
dictionary words across the entire system.
IV. SECURITY ANALYSIS
Grid authentication card security is determined by a number
of factors. Card size is arguably the most important variable.
Increasing the grid size (i.e., number of cells) and format (i.e.,
contents of the cell) exponentially increases the number of
challenge responses available.
Entropy is defined as the uncertainty involved in predicting
the value of a random variable. In this case, it refers to the
ability to predict the information contained on a grid card —
both coordinates and characters.
A larger grid card and additional cell contents increase the
uncertainty of predicting the coordinates and characters on the
card. In other words, more variables mean less chance of
―cracking‖ the grid.
However, OTP security measures have not proven totally
secure. Once grid cards and tokens appeared on the online
banking landscape, it was not long before the banks started to
see phishing scams targeting OTPs.
Some banks do not limit reloading times it keep reloading
until the eavesdropped pattern appears. If the grid card does not
have many enough numbers, the card could be reproduced by
eavesdropping for several times. And it can be successfully
phished by entering all the numbers in grid card. Grid card
adopts 8-10 random numbers even easier to phish.
In these cases, phishing e-mails generally tried to trick the
banking user by asking him to "authenticate" or "revalidate" his
token or grid card by entering a long series of OTPs from the
token or the entire contents of the grid card. So we add salt
password so without a salt, a successful SQL injection (it is a
code injection technique that exploits a security vulnerability in
a website’s software to retrieve the database contents to the
attacker) attack may yield easily crackable passwords. Because
many users re-use passwords for multiple sites, the use of a salt
is an important component of overall web application security.
The benefit provided by using a salted password is also making
a lookup table assisted dictionary attack against the stored
values impractical.
Salt also makes brute-force attacks (the technique for
checking all possible keys until the correct key is found in a
database) for cracking large numbers of passwords much
slower. Without salts, an attacker who is cracking many
passwords at the same time only needs to hash (the random bit
string) each password guess once, and compare it to all the
hashes. Using Salt each password will likely have a different
bit; so each guess would have to be hashed separately for each
Salt, which is much slower since hashing is generally
computationally expensive. Simple, easy-to-use authenticator
for any industry, region or user population and proven
authenticator as part of the software authentication platform .
Cost-effective solution that is a fraction of the cost of
traditional two-factor options. The coordinate request changes
for each authentication challenge.
V. CONCLUSION
Online banking services were introduced by banks in 2002
and the number of service providers reached 9 commercial
banks by the end of 2009. As of 2009, Online bank users
numbered 3,566, representing 134,100 transactions and 3.3
billion MNT in value.
Conducting financial transactions was made easy with
online banking (or Internet banking) that allows customers to
conduct financial transactions on a secure website. However,
with increased convenience, the threats of online banking fraud
have also become a greater concern. Customer confidence and
loyalty to a bank with online banking services depend greatly
on the protection against banking fraud and identity theft.
The use of a secure website has become almost universally
adopted. Though single password authentication is still in use,
it by itself is not considered secure enough for online banking
in Mongolia . Basically there are two different security
methods in use for Mongolian online banking.
The PIN/TAN system where the PIN represents a
password, used for the login and TAN(security tokens)s
representing one-time passwords to authenticate transactions.
TANs can be distributed in different ways, the most popular
one is to send a list of TANs to the online banking user by
postal letter. Another way of using TANs is to generate them
by need using a security token. These token generated TANs
depend on the time and a unique secret, stored in the security
token (two-factor authentication or 2FA).
Many of the banks in the Mongolia, the task becomes
inherently more expensive, especially when customers are not
willing to pay for such tokens. A typical hardware token based
on a 3-year period costs the bank almost US$ 60-$125 per
customer (when fully implemented, cost of hardware device,
servers, support, marketing, postage, etc.)
Signature based online banking where all transactions are
signed and encrypted digitally. The Keys for the signature
generation and encryption can be stored on smartcards or any
memory medium, depending on the concrete implementation.
A signature takes the concept of traditional paper-based signing
and turns it into an electronic ―fingerprint.‖ This ―fingerprint,‖
or coded message, is unique to both the document and the
signer and binds them together.
REFERENCES
[1] THE S/KEYTM ONE-TIME PASSWORD SYSTEM‖Neil M.
Haller,Bellcore http://www.cs.utk.edu/~dunigan/cs594-cns/skey.pdf.
(references)
[2] The N/R One Time Password System‖Vipul Goyal, Ajith Abraham,
Sugata Sanyal and Sang Yong Han OSP Global, Mumbai, India.
[3] ―One-Time Password Authentication Scheme Using Smart Cards
Providing User ―YOON Eun-Jun ; YOO Kee-Young, Deparment of
computer engineering,Kyunbook National University K. Elissa
[4] http://en.wikipedia.org/wiki/Stream_cipher -incl: RC4, A5/1, A5/2.
[5] ―Enhanced Authentication In Online Banking‖ Gregory D. Williamson
GE Money – America’s Journal of Economic Crime Management 2006
[6] ―Security Analysis of Pseudo-Random Number Generators with Input‖
Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien
Vergnaud, and Daniel Wichs
[7] ― Securing E-Mail Communication Using Hybrid Cryptosystem on
Android-based Mobile Devices‖Teddy Mantoro, Andri Zakariya
[8] ―How to Make Secure Email Easier To Use‖ Simson L. Garfinkel Erik
Nordlander Robert C. Miller MIT CSAILCambridge, MA
{simsong,erikn,rcm}@mit.edu David Margrave Amazon.com Seattle,
WA DavidMA@amazon.com Jeffrey I. Schiller MIT Network Services
[9] NIST Special Publication 800-90A ―Recommendation for Random
Number Generation Using Deterministic Random Bit Generators‖Elaine
Barker and John Kelsey

More Related Content

What's hot

Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Kailas Patil
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_faHai Nguyen
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesIAEME Publication
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTPIRJET Journal
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011prasanna9
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET Journal
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailarHai Nguyen
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideHai Nguyen
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET Journal
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyIJSRD
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordIOSR Journals
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideNick Owen
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordIJERA Editor
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secureUvaraj Shan
 
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...IJERA Editor
 
An efficient implementation for key management technique using smart card and...
An efficient implementation for key management technique using smart card and...An efficient implementation for key management technique using smart card and...
An efficient implementation for key management technique using smart card and...ijctcm
 
Efficient Securing System Using Graphical Captcha
 Efficient Securing System Using Graphical Captcha Efficient Securing System Using Graphical Captcha
Efficient Securing System Using Graphical CaptchaSankar Anand
 

What's hot (19)

Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
 
Sms based otp
Sms based otpSms based otp
Sms based otp
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time Password
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guide
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secure
 
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
 
An efficient implementation for key management technique using smart card and...
An efficient implementation for key management technique using smart card and...An efficient implementation for key management technique using smart card and...
An efficient implementation for key management technique using smart card and...
 
Efficient Securing System Using Graphical Captcha
 Efficient Securing System Using Graphical Captcha Efficient Securing System Using Graphical Captcha
Efficient Securing System Using Graphical Captcha
 

Similar to Online applications using strong authentication with OTP grid cards

A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationeSAT Journals
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationseSAT Publishing House
 
E AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTPE AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTPIRJET Journal
 
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyEmpirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyIJERA Editor
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secureUvaraj Shan
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsIRJET Journal
 
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...IRJET Journal
 
REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...
REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...
REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...IJNSA Journal
 
Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern SecurityThree Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Securityijtsrd
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET Journal
 
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONAN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONIJCNCJournal
 
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONAN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONIJCNCJournal
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking SecurityIRJET Journal
 
Secure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual AuthenticationSecure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual AuthenticationTELKOMNIKA JOURNAL
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure AuthenticationIRJET Journal
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_briefHai Nguyen
 
Two-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless ApproachTwo-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless ApproachPortalGuard
 

Similar to Online applications using strong authentication with OTP grid cards (20)

A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authentication
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
 
87559489 auth
87559489 auth87559489 auth
87559489 auth
 
E AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTPE AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTP
 
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyEmpirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
 
120 i143
120 i143120 i143
120 i143
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secure
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
 
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
 
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORDSECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
 
REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...
REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...
REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...
 
Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern SecurityThree Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Security
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor Authentication
 
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONAN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
 
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONAN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
 
Secure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual AuthenticationSecure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual Authentication
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_brief
 
Two-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless ApproachTwo-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless Approach
 

More from Bayalagmaa Davaanyam

Мэдээлэл технологи ашиглан лекцийн үр дүнг дээшлүүлэх асуудал
Мэдээлэл технологи ашиглан лекцийн үр дүнг дээшлүүлэх асуудалМэдээлэл технологи ашиглан лекцийн үр дүнг дээшлүүлэх асуудал
Мэдээлэл технологи ашиглан лекцийн үр дүнг дээшлүүлэх асуудалBayalagmaa Davaanyam
 
Мод, графын ерөнхий зарчим
Мод, графын ерөнхий зарчимМод, графын ерөнхий зарчим
Мод, графын ерөнхий зарчимBayalagmaa Davaanyam
 
Файлын оролт гаралт
Файлын оролт гаралтФайлын оролт гаралт
Файлын оролт гаралтBayalagmaa Davaanyam
 
Эрэмбэлэлт хайлтын аргууд
Эрэмбэлэлт хайлтын аргуудЭрэмбэлэлт хайлтын аргууд
Эрэмбэлэлт хайлтын аргуудBayalagmaa Davaanyam
 
9.эрэмбэлэлтийн аргууд
9.эрэмбэлэлтийн аргууд9.эрэмбэлэлтийн аргууд
9.эрэмбэлэлтийн аргуудBayalagmaa Davaanyam
 
9.эрэмбэлэлтийн аргууд
9.эрэмбэлэлтийн аргууд9.эрэмбэлэлтийн аргууд
9.эрэмбэлэлтийн аргуудBayalagmaa Davaanyam
 
9.эрэмбэлэлтийн аргууд
9.эрэмбэлэлтийн аргууд9.эрэмбэлэлтийн аргууд
9.эрэмбэлэлтийн аргуудBayalagmaa Davaanyam
 

More from Bayalagmaa Davaanyam (11)

Social sciences bayalagmaa
Social sciences bayalagmaaSocial sciences bayalagmaa
Social sciences bayalagmaa
 
Мэдээлэл технологи ашиглан лекцийн үр дүнг дээшлүүлэх асуудал
Мэдээлэл технологи ашиглан лекцийн үр дүнг дээшлүүлэх асуудалМэдээлэл технологи ашиглан лекцийн үр дүнг дээшлүүлэх асуудал
Мэдээлэл технологи ашиглан лекцийн үр дүнг дээшлүүлэх асуудал
 
Мод, графын ерөнхий зарчим
Мод, графын ерөнхий зарчимМод, графын ерөнхий зарчим
Мод, графын ерөнхий зарчим
 
Файлын оролт гаралт
Файлын оролт гаралтФайлын оролт гаралт
Файлын оролт гаралт
 
Hash function
Hash functionHash function
Hash function
 
C standard library
C standard libraryC standard library
C standard library
 
Preproc
PreprocPreproc
Preproc
 
Эрэмбэлэлт хайлтын аргууд
Эрэмбэлэлт хайлтын аргуудЭрэмбэлэлт хайлтын аргууд
Эрэмбэлэлт хайлтын аргууд
 
9.эрэмбэлэлтийн аргууд
9.эрэмбэлэлтийн аргууд9.эрэмбэлэлтийн аргууд
9.эрэмбэлэлтийн аргууд
 
9.эрэмбэлэлтийн аргууд
9.эрэмбэлэлтийн аргууд9.эрэмбэлэлтийн аргууд
9.эрэмбэлэлтийн аргууд
 
9.эрэмбэлэлтийн аргууд
9.эрэмбэлэлтийн аргууд9.эрэмбэлэлтийн аргууд
9.эрэмбэлэлтийн аргууд
 

Recently uploaded

80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 

Recently uploaded (20)

80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 

Online applications using strong authentication with OTP grid cards

  • 1. Online applications using strong authentication with OTP grid cards Bayalagmaa Davaanaym) Department of Professional Soyol Erdem University Ulaanbaatar,48/88,Mongolia E-mail: bayalag2007@yahoo.com Abstract—Several techniques using technology based on biometrics, passwords, certificates, and smart cards can be used for user authentication in the accessible network system. One of the most popular areas in OTP authentication protocol can be used for an authenticating user by a server. Focusing on methods that are used to implement strong user authentication for online- consumer identities, this paper aims to distill a comprehensive view of strong user authentication by examining its concepts, implementation approaches, and challenges/additional concerns at the architectural level. It discusses effective solution approaches, overall architecture designs, and emerging developments. Authentication system over Grid card allows you to change the policy and define the entropy of a card and its strength. Grid cards also may be set to expire with greater frequency — requiring the issuance of new cards — to increase security. Keywords—One time password, grid card authentication I. INTRODUCTION Passwords as a means of authentication have long reached their expiry date. Web-based user-authentication systems without compromising usability and ubiquity, when the Internet is accessed mostly through a browser that has limited access to the client environment and hardware devices. The most common solution approaches that are used today involve, in more generalized terms, various forms of enhanced shared- secret and multifactor authentication. Enhanced shared-secret authentication refers to extensions of conventional knowledge-based (single-factor) authentication—for example, additional passwords, site keys, preregistered graphical icons to support mutual authentication, challenge-response, randomized code selections that are based on input patterns, CAPTCHA, and so on. Multifactor authentication refers to a compound implementation of two or more classes of human- authentication factors: Something known to only the user— Knowledge-based (for example, password, pass phrase, shared secrets, account details and transaction history, PIN, CAPTCHA, and so on). Something held by only the user—Possession-based (for example, security token, smart card, shared soft tokens, mobile device, and so on). Something inherent to only the user—Biological or behavior biometric traits (for example, facial recognition, fingerprint, voice recognition, keystroke dynamics, signature, and so on). For example, many enterprise extranet/VPN solutions today require both simple credentials (something known, such as ID and password) and hardware tokens (something held, such as secure ID with time-based one-time password generators, smart cards that use embedded PKI solutions, and so on) in order to gain access. The combination of the two "known" and "held" factors makes up the multifactor authentication method, and significantly improves the authentication strength, as it curtails the threat of stolen digital identities. In practice, however, there is a wealth of implementations, methods, and permutations of them—all with varying trade- offs in terms of cost, complexity, usability, and security. It is standard practice to achieve strong authentication by requiring the communicating party to provide two different pieces of authentication of different types: in this case these are the user password (something known) and the one-time password (something possessed). Fig. 1. Example of a figure caption. (figure caption) TABLE I. Type device OTP PKI (HW) Biometry Strong authentication * Encryption * Digital signature * Non repudiation * Strong link with the user * a. * Biometry type Fingerprinting b. In Mongolia, online banking and online services are increasing. Online banking (or Internet banking) that allows customers to conduct financial transactions on a secure website. However, with increased convenience, the threats of
  • 2. online banking fraud have also become a greater concern. Customer confidence and loyalty to a bank with online banking services depend greatly on the protection against banking fraud and identity theft. But Most of the banks are single password authentication is still in use, it by itself is not considered secure enough for online banking in Mongolia. Goal of this paper that improve online applications secure in Mongolia with grid card authentication system. The grid card is functionally equivalent to the electronic tokens commonly used for applications such as online banking. Companies and banks have been introducing a variety of methods to improve the authentication of customers. For examples, some banks are distributing special cards to their customers that resemble grid cards. During authentication, users are prompted with column and row numbers, and they have to provide the secret number contained in the corresponding cell. This provides a second form of authentication, something you have, along with the traditional username and password. Since an imposter does not have the security card, they are not able to look-up the correct information in each cell when they attempt to fraudulently access the user account. Chapter 2 of this study explains the grid card authentication related study, and chapter 3 presents a password key creation method through extraction of grid card with OTP. Grid card authentication is strong authentication function, it can create temporary one time password keys. Chapter 4 carries out a simulation adopting the presented one time password key using grid card algorithm, and lastly, draws a conclusion. II. RELATED WORKS A. Grid card authentication The multi-factor authentication system requires a password, plus the grid that’s often printed on the back of a special card and salt. When a user logs in using their ID and password , they are prompted for a random cell in the grid. The user then enters the correct combination of numbers and letters in that cell and is granted access. Each grid card is unique and carries a serial number, so every user can be uniquely identified and authenticated. Each time a user is asked to authenticate they are presented with a different challenge requiring them to validate via a different set of grid coordinates. The coordinate request changes for each authentication challenge. In this scenario, the challenge presents the user with coordinates such as B2, F5 and J4. The user refers to their unique grid card to provide the information from the requested cells: 18, H1, X8. Challenge Generation Algorithms After enabling grid authentication, Authentication system allows you to choose between two challenge-generation algorithms. Random Challenge algorithm (default) picks cells randomly when creating a challenge. The process for creating a challenge does not depend on previous challenges. Random Challenge algorithm that choose DRBG. Deterministic Random Bit Generators (also known as Pseudo Random Number Generators – PRNGs) take input (a seed) from either the noise source(s) or the conditioning step and produce outputs of random values Least-Used Cells Challenge This algorithm uses one or more least-used cells (set in policy) in every challenge. By generating challenges using the least-used cells from a user’s grid, it becomes more difficult for an attacker who has previously viewed some successful authentications to correctly respond to the challenge. B. One Time Password One Time Password (OTP) is a password system where passwords can only be used once, and the user has to be authenticated with a new password key each time. It is a password key creation method that makes it extremely difficult to predict the next password key based on the current password. A new password key is created in its own device constantly after a set period of time and the user has to enter a new password every time he or she uses the system, so it prevents exposure of the user’s password due to hacking or the user’s mistake. OTP has much stronger security because the user has to enter a newly created password key even if his or password is exposed. Most OTPs’ password key creation algorithms are based on one-way functions. For example, S/Key systems (RFC1760) in almost all UNIX OS use such functions. The OTP is standardized by the IETF, and standardized again by verification related companies, and the RSA and OATH are carrying out the most competitive standardizations. III. CREATION OF PASWORD KEYS USING GRID CARD Normally when a user requests authentication, even after first contact, certain important services confirm passwords again. However, as explained above, the existing password system has many weaknesses, and a solution for this is one time password mechanism. The elements of one time password mechanism are a token included in a security/password algorithm or one time password key creating device, a authentication server and a authentication client. Since the one time password mechanism is a program, it is programmed to be random, but the randomness breaks after a certain period of time and passwords become predictable so one time password mechanisms have the disadvantage of having to exchange OTP modules after a certain period of time. In order to overcome such weaknesses, this study presents a method of creating one time password keys in OTP Clients using grid card characteristics. On characteristics of this study that should be focused on is that the OTP system is not positioned in the OTP Server. The password key creation process starts with a user logs in using their ID and password send to request to server. Then next process shows the randomly prime number of coordinate challenge selecting and reply to client. The process of creating a combination of permutation using the selected prime number by order, and
  • 3. creation of coordinate challenge using S/Key authentication scheme. OTP password is a secret key that salt words and information in the corresponding cells from the unique grid card they possess. Figure1. Grid card authentication system with salt passwords This secret key can either be provided by the user, or can be generated by a computer. In case we choose salt is a random string of data used to modify a password hash. Salt can be added to the hash to prevent a collision by uniquely identifying a user's password, even if another user in the system has selected the same password. Salt can also be added to make it more difficult for an attacker to break into a system by using password hash-matching strategies because adding salt to a password hash prevents an attacker from testing known dictionary words across the entire system. IV. SECURITY ANALYSIS Grid authentication card security is determined by a number of factors. Card size is arguably the most important variable. Increasing the grid size (i.e., number of cells) and format (i.e., contents of the cell) exponentially increases the number of challenge responses available. Entropy is defined as the uncertainty involved in predicting the value of a random variable. In this case, it refers to the ability to predict the information contained on a grid card — both coordinates and characters. A larger grid card and additional cell contents increase the uncertainty of predicting the coordinates and characters on the card. In other words, more variables mean less chance of ―cracking‖ the grid. However, OTP security measures have not proven totally secure. Once grid cards and tokens appeared on the online banking landscape, it was not long before the banks started to see phishing scams targeting OTPs. Some banks do not limit reloading times it keep reloading until the eavesdropped pattern appears. If the grid card does not have many enough numbers, the card could be reproduced by eavesdropping for several times. And it can be successfully phished by entering all the numbers in grid card. Grid card adopts 8-10 random numbers even easier to phish. In these cases, phishing e-mails generally tried to trick the banking user by asking him to "authenticate" or "revalidate" his token or grid card by entering a long series of OTPs from the token or the entire contents of the grid card. So we add salt password so without a salt, a successful SQL injection (it is a code injection technique that exploits a security vulnerability in a website’s software to retrieve the database contents to the attacker) attack may yield easily crackable passwords. Because many users re-use passwords for multiple sites, the use of a salt is an important component of overall web application security. The benefit provided by using a salted password is also making a lookup table assisted dictionary attack against the stored values impractical. Salt also makes brute-force attacks (the technique for checking all possible keys until the correct key is found in a database) for cracking large numbers of passwords much slower. Without salts, an attacker who is cracking many passwords at the same time only needs to hash (the random bit string) each password guess once, and compare it to all the hashes. Using Salt each password will likely have a different bit; so each guess would have to be hashed separately for each Salt, which is much slower since hashing is generally computationally expensive. Simple, easy-to-use authenticator for any industry, region or user population and proven authenticator as part of the software authentication platform . Cost-effective solution that is a fraction of the cost of traditional two-factor options. The coordinate request changes for each authentication challenge. V. CONCLUSION Online banking services were introduced by banks in 2002 and the number of service providers reached 9 commercial banks by the end of 2009. As of 2009, Online bank users numbered 3,566, representing 134,100 transactions and 3.3 billion MNT in value. Conducting financial transactions was made easy with online banking (or Internet banking) that allows customers to conduct financial transactions on a secure website. However, with increased convenience, the threats of online banking fraud have also become a greater concern. Customer confidence and loyalty to a bank with online banking services depend greatly on the protection against banking fraud and identity theft. The use of a secure website has become almost universally adopted. Though single password authentication is still in use, it by itself is not considered secure enough for online banking in Mongolia . Basically there are two different security methods in use for Mongolian online banking. The PIN/TAN system where the PIN represents a password, used for the login and TAN(security tokens)s representing one-time passwords to authenticate transactions. TANs can be distributed in different ways, the most popular one is to send a list of TANs to the online banking user by postal letter. Another way of using TANs is to generate them by need using a security token. These token generated TANs
  • 4. depend on the time and a unique secret, stored in the security token (two-factor authentication or 2FA). Many of the banks in the Mongolia, the task becomes inherently more expensive, especially when customers are not willing to pay for such tokens. A typical hardware token based on a 3-year period costs the bank almost US$ 60-$125 per customer (when fully implemented, cost of hardware device, servers, support, marketing, postage, etc.) Signature based online banking where all transactions are signed and encrypted digitally. The Keys for the signature generation and encryption can be stored on smartcards or any memory medium, depending on the concrete implementation. A signature takes the concept of traditional paper-based signing and turns it into an electronic ―fingerprint.‖ This ―fingerprint,‖ or coded message, is unique to both the document and the signer and binds them together. REFERENCES [1] THE S/KEYTM ONE-TIME PASSWORD SYSTEM‖Neil M. Haller,Bellcore http://www.cs.utk.edu/~dunigan/cs594-cns/skey.pdf. (references) [2] The N/R One Time Password System‖Vipul Goyal, Ajith Abraham, Sugata Sanyal and Sang Yong Han OSP Global, Mumbai, India. [3] ―One-Time Password Authentication Scheme Using Smart Cards Providing User ―YOON Eun-Jun ; YOO Kee-Young, Deparment of computer engineering,Kyunbook National University K. Elissa [4] http://en.wikipedia.org/wiki/Stream_cipher -incl: RC4, A5/1, A5/2. [5] ―Enhanced Authentication In Online Banking‖ Gregory D. Williamson GE Money – America’s Journal of Economic Crime Management 2006 [6] ―Security Analysis of Pseudo-Random Number Generators with Input‖ Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien Vergnaud, and Daniel Wichs [7] ― Securing E-Mail Communication Using Hybrid Cryptosystem on Android-based Mobile Devices‖Teddy Mantoro, Andri Zakariya [8] ―How to Make Secure Email Easier To Use‖ Simson L. Garfinkel Erik Nordlander Robert C. Miller MIT CSAILCambridge, MA {simsong,erikn,rcm}@mit.edu David Margrave Amazon.com Seattle, WA DavidMA@amazon.com Jeffrey I. Schiller MIT Network Services [9] NIST Special Publication 800-90A ―Recommendation for Random Number Generation Using Deterministic Random Bit Generators‖Elaine Barker and John Kelsey