Report on Technique of User Authentication Using Numeric OTP Scheme

Verified

Added on  2023/06/13

|4
|795
|391
Report
AI Summary
This report explores a user authentication technique employing a numeric One-Time Password (OTP) scheme. It begins by highlighting the increasing need for secure online systems and the evolution of authentication methods, including token-based, biometric-based, and knowledge-based approaches, with a focus on the limitations of traditional text-based passwords and graphical password techniques. The report details various attacks such as brute force, dictionary attacks, spyware, and social engineering. It then introduces a modern authentication method using numeric OTPs, widely adopted in government, banking, and corporate sectors to mitigate password compromise. The report also outlines a proposed algorithm model for implementing this user authentication scheme, discussing the advantages of the research while also noting its limitations, such as the lack of discussion on potential attacks on OTP-based schemes and corresponding mitigation strategies. It concludes that the OTP scheme represents a significant advancement in user authentication and security technologies.
Document Page
Running head: TECHNIQUE OF USER AUTHENTICATION USING NUMERIC OTP
Technique of User Authentication Using Numeric OTP Scheme
Name of the Student
Name of the University
Author’s note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1TECHNIQUE OF USER AUTHENTICATION USING NUMERIC OTP
1. Summary
The increased use of different online services has presented a need to improve a secure
system. The system be designed in such a way that it would be able to authenticate and validate
the authorized user. In the recent times, several schemes of user authentication have been
developed. Various methods of authentication such as token based, biometric based and
knowledge based have been developed. The text-based system of passwords has been the major
method of security medium over the years. Although the text based system of verification has
been the base of authentication for several years, yet it has faced some drawbacks in the present
times. The report discusses on the various attacks that are attempted to crack the systems. There
are several attacks on the text based password method and graphical password techniques. The
different kinds of attacks that are faced are brute force attack, dictionary attacks, guessing,
spyware attacks, social engineering and shoulder surfing. The report provides a brief insight on
these various kinds of attacks and the way in which they are imposed. This report focusses on a
latest technique of the authentication of the user, which would be based on using a numeric
scheme of One Time Password (OTP). This new method of authentication has been widely
adopted by the government sector, banks and corporate sector based virtual private networks
(VPNs) so as to diminish the effects of the compromise of the password. It also discusses a
proposed algorithm model, which could be used in order to implement the newer technique of
this user authentication scheme.
2. Advantages and Disadvantages of One Time Password Scheme
This paper focusses on the new technique for authentication of a user, which may be
implemented in the new IT systems.
Document Page
2TECHNIQUE OF USER AUTHENTICATION USING NUMERIC OTP
The advantages of this research paper are:
The research paper discusses about the various previously used methods of the
authentication of the user
This paper discusses about the various possible attacks that could be imposed on text
based password schemes and techniques of graphical passwords.
The paper also focusses on the newest technique of verification and also provides an
insight of a proposed algorithm of one time password based scheme.
The disadvantages of this research paper are:
The research paper has lacked to describe the various possibilities of attacks that could be
imposed by attackers on OTP based schemes.
This paper also lacks the various mitigation strategies, which should be applied on OTP
based schemes in order to avoid such vulnerable attacks on the system of the users.
The paper discusses about the various tolerable attacks on text based systems but it fails
to describe about their various mitigation schemes.
Based on the different sections of the research paper, it can be concluded that the new
feature of one time password scheme would be a great step towards the authentication of the
users who would use any IT systems. The feature described in the research paper would be able
to authenticate the user and thus provide a better insight for the betterment of the security
technologies.
Document Page
3TECHNIQUE OF USER AUTHENTICATION USING NUMERIC OTP
Bibliography
Gurav, S.M., Gawade, L.S., Rane, P.K. and Khochare, N.R., 2014, January. Graphical password
authentication: Cloud securing scheme. In Electronic Systems, Signal Processing and Computing
Technologies (ICESC), 2014 International Conference on (pp. 479-483). IEEE.
Huang, Y., Huang, Z., Zhao, H. and Lai, X., 2013. A new one-time password method. IERI
Procedia, 4, pp.32-37.
Ma, Y., Feng, J., Kumin, L. and Lazar, J., 2013. Investigating user behavior for authentication
methods: a comparison between individuals with down syndrome and neurotypical users. ACM
Transactions on Accessible Computing (TACCESS), 4(4), p.15.
Yassin, A.A., Jin, H., Ibrahim, A., Qiang, W. and Zou, D., 2013. Cloud authentication based on
anonymous one-time password. In Ubiquitous Information Technologies and Applications (pp.
423-431). Springer, Dordrecht.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]