OTP Authentication
Scheme based on
Elliptic Curves for Internet
of Things (IoT)
By:
Ms. Pooja Mehta
GTU PG School-CDAC-BISAG,
ME-IT Systems and Network Security
Gandhinagar
2
 Abstract
 Introduction
 Proposed OTP Scheme Based on Identity Based Elliptic
Curve
 Future Work
 References
Content
3
Abstract
 End-to-end communication
 Two-factor authentication mechanism
 OTP for IoT
4
Introduction
5
Cont..
6
Proposed OTP Scheme Based On
Identity Based Elliptic Curve
 IBE-ECC to design a OTP scheme
 Proposed OTP Generation Scheme using Lamport’s
OTP Algorithm
Hn(x) = H(Hn-1(Hn-2(Hn-3(….H(x)))))
7
Future Work
 Requires lesser resources for operation as compared
to the existing schemes with a smaller key size and
lesser infrastructure
 IRNSS is using Diffie – Hellman algorithm for
encryption in satellite communication
 Different prime numbers up to 2^128 bit
 Alice and Bob choose Y and modulus p
 Alice’s function : Y^A(mod p)
 Bob’s function : Y^B(mod p)
 Private key is : Y^AB = Y^BA (mod p)
 Eve cannot compute Y^AB from p, Y, Y^A,
Y^B
Diffie-Hellman
8
9
References
 http://www.msr-
waypoint.com/enus/um/people/klauter/ieeefinal.pdf
 http://arstechnica.com/security/2015/10/how-the-nsa-can-
break-trillions-of-encrypted-web-and-vpn-connections/
 https://threatpost.com/prime-diffie-hellman-weakness-may-be-
key-to-breaking-crypto/115069/
 https://hackaday.com/tag/diffie-hellman/
https://www.schneier.com/blog/archives/2015/05/the_logjam_a
nd_.html
 https://weakdh.org/
http://www.slate.com/blogs/future_tense/2015/10/16/researcher
s_say_the_common_diffie_hellman_key_exchange_is_vulnerab
le_to.html
10
Thank
you !

Otp authentication scheme based on ECC