Loading

FPGA Based OTP Generation System for Data Security
Fazal Noorbasha1, Ch. Rahul Krishna2, Shaik. HafijullaIrshad3
1Fazal Noorbasha, Associate Professor, Department of ECE, Koneru Lakshmaiah Education Foundation (K L Deemed to be University), Vaddeswaram, India.
2Ch. Rahul Krishna, UG Student, Department of ECE, Koneru Lakshmaiah Education Foundation (K L Deemed to be University), Vaddeswaram, India.
3Shaik. HafijullaIrshad, UG Student, Department of ECE, Koneru Lakshmaiah Education Foundation (K L Deemed to be University), Vaddeswaram, India. 

Manuscript received on January 02, 2020. | Revised Manuscript received on January 15, 2020. | Manuscript published on January 30, 2020. | PP: 1836-1839 | Volume-8 Issue-5, January 2020. | Retrieval Number: E4879018520/2020©BEIESP | DOI: 10.35940/ijrte.E4879.018520

Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The password system is the most conventional method among validation techniques on the internet and is operated more easily and effectively than other methods. However, it is a vulnerable method against attacks such as eavesdropping or replay attack. To prevail over this problem, OTP (One Time Password) technique is used. The most popular OTP is HOTP algorithm, which is based on one-way hash function SHA-1. The recent researches show the weakness of the hash function. So, in this paper we created a module which uses another cryptographic algorithm. Cryptography in the current world serves an important role in data security. Cryptography means writing of secret codes (cipher text) which is in an unintelligible form and cannot be read unless we have a perfect key to decode it. The proposed method is AES algorithm (128 bit) followed by Middle Square method to generate an OTP. As OTP is a 4-6 bit number we will decrease the AES output to a 4-6 bit through Middle Square method and this OTP can be used as a security tool in many cases like online transaction purposes.
Keywords: Ciphertext, HOTP, Middle Square Method, SHA-1
Scope of the Article: Smart Learning Methods And Environments.