An Encryption Key for Secure Authentication: The Dynamic Solution
Volume 2, Issue 3, Page No 540–544, 2017
Adv. Sci. Technol. Eng. Syst. J. 2(3), 540–544 (2017);
DOI: 10.25046/aj020369
Keywords: AES, Cryptography, Dynamic Password, EYE, Feistel Block Cipher
In modern day technology, the Information Society is at risk. Passwords are a multi-user computer systems usual first line of defence against intrusion. A password may be textual with any combination of alphanumeric characters or biometric or 3-D. But no authentication protocol is fully secured against todays hackers as all of them are Static in type. Dynamic authentication protocol is still a theoretical concept. In this paper, we are focusing on a concept of authentication technique which is actually dynamic in genre, i.e. the password here will change in t time (where t is as small as possible). This technique comprises of both hardware and software part. In this paper, we have covered the idea of generating an efficient algorithm that can work as the final in the Dynamic Password Authentication system. We have used standard deviation within statistics to generalize the possible password which is further secured by Feistel Block Cipher and Advanced Encryption Standard technique (AES), leading and following the said mathematics respectively. In order to allow the system to create variable password in the least time interval possible, we must make sure our process is not much complex.
1 Introduction
This paper is an extension of the research work named Secure Authentication with Dynamic Password presented in the IEEE IEMCON, , Vancouver, Canada, 2016. [1]
When it is the matter with network security, we have to be updated always. As for example, today we simply cannot afford any security system that includes a dilapidated protocol (as for example Caesar Shift Cipher). Security protocols are used to protect several different medium using passwords, which supposed to be known only to the users of the system. Textual password authentication system is the most widely used protocol, though it is not much secure against Shoulder Surfing Attack, Brute Force Attack [2]. Smartcard concept, 3-d password concept are not totally protected either [3], [4]. Biometric system may be the most powerful authentication system ever, but it is much costly [2]. Dynamic password authentication system is the latest system that has come in the field. In this work we have discussed about the cryptographic way to generate the dynamic password for the authentication protocol described in the said conference [1].
The authentication protocol described in the conference is a combination of both the hardware and software. Here we are imagining a chip which will be used as the key to unlock different ids. According to the main work, we have taken a random textual password e.g. Password. The ASCII values of each letter acts as equivalence to mass where we have used Einstein’s Theory on bending Space-Time Continuum because of Mass. Now we have placed the textual password (here Password) on 3-d box which is described by the X-Y-Z coordinates [1].
Later we have used the concept of the eye. The EYE (technically a sensor) is the only object inside the 3-D box. The EYE will actually take a random position inside the 3-D box (i.e. the X, Y, Z coordinates of it will be selected randomly). Now the EYE will trace the endings of the shifted parts in the plane by joining them.
Fig.1: Traced path according as the position of the eye
If we manage to let the eye to change its position in t time (t is as small as possible), then during each time interval we will have a different path as shown.
Since at a certain time, the received traced path is the key of the real password, by changing the position of the EYE, and hence by getting different traced path in each time interval t, we gain the dynamically changeable password.
In this paper we have tried to make an algorithm that will be able to convert the traced path (technically a geometric figure) to a combination of binary digits (0 and 1). This expression gained at a certain time will be the password at that time interval. We will try to add some cryptographic concept in the algorithm to make a final defence in the system. The mathematical idea used to convert the geometric figure an expression of standard deviation (in decimal) will be both followed by and lead two different cryptographic concepts the first one is general Feistel Block Cipher concept,[5], [6] and the later one is AES (Advanced Encryption Standard) algorithm.
2 Security with Feistel Block Cipher Model
We will move further assuming that the textual password chosen by the user was Password. Before going to the generation of the password from the traced path, we need to find the coordinate of the points of the path, which we will do in this process. We will follow the general Feistel Block Cipher concept, i.e. at first, we will divide the plaintext into 2 equal parts say L and R. The plaintext will be the ASCII representation of the textual password. Hence we have the plaintext ASCII representation of Password
- [5],[6]
Now the string will be divided into 2 halves based on the length of it. If the length of the string is found even, the L, R will be of equal length. If the length of the string is found odd, the length of L will be 1 greater than that of R.
Here we have the length 22. Hence L will be 80971151151 and R will be 19111114100. Each digit in L and R are added and the results will be stored in R‘ and L‘ respectively. The addition of digits in L is 39 and the addition of digits in R is 20. Hence R‘ will store 39 and L‘ will store 20.
We will count (R‘ modulo 2) and (L‘ modulo 2). To find the axis of the traced path, we will follow a concept
As for example if (L‘ modulo 2) is 1 and (R‘ modulo 2) is 1 then we will consider that the traced path will be in 3rdquadrant and proceed to the mathematics (hence 0 represents positive quadrant and 1 represents negative quadrant). The values of L‘ and R‘ will be the x-coordinate and z-coordinate of the initial point in the traced path respectively.
Fig.4: Feistel Block Cipher Model to get quadrant and initial coordinate
In our example, (L‘ modulo 2) is 0 and (R‘ modulo 2) is 1. Hence the traced expression will be in the 4thquadrant. The initial point will be (20, -39). It should be mentioned that the graph, starting from a specific quadrant, may end in a different quadrant.
A case to be noted that in this concept we havent used Feistel Block Cipher completely. Here we havent used any key and there is no functioning it with L. Instead, we have changed both L and R to R‘ and L‘ respectively. The swapping of L and R to R‘ and L‘ is done only once instead of having several rounds.
3 Derivation of the Traced Path
Suppose there are n letters in the password. So, we have n corresponding extreme points in the x-z graph. Here, we connect each 2 consecutive extreme points to get one straight line. Thus, in total we get (n-1) of such straight lines, each having a definite equation f(z,x)=0. The equation of each straight line is provided by the system.
Our job is to find variance (similar to what is used in case of problems with large number of bodies)[7], and thus standard deviation for the distance of each part from x axis (z) for each of (n-1) Straight lines.
V ariance = σ2 =< z2 > − < z >2 (1)
R b
< z >= a zρ(x)dx where (a,z1), (b,z2) are the two extremities of a Straight lines where b > a. Here ρ(x) is the probability density such that ρ(x)dx defines the probability of an individual being in the interval of (x,x+dx).
Fig.5: Derivation of traced path
Here, length of a,b, = dxSecθ Length of ab = xSecθ
So,
dx
ρ(x)dx = (2) x
Therefore,
Z b
zdx
< z >= (3) a x
< z2 >= Z b z2dx (4) a x
Performing the integrations, we can have σ2 Now, standard deviation= σ
Thus, we will have (n-1) no. of standard deviations for (n-1) of Straight lines.
Let, these standard deviations are σ1, σ2,………
σ(n−1)
Let, σk = Σni=1−1nσ−i 1, is the standard deviation.
Standard Deviation of those standard deviations is:
qΣni=1−1(σk −σi)2
σp = n−1 (5) σp is the password at that moment.
Come to think about it, for a password with n letters, there are (26+10+30)n = 66n [26−→ English letters, 10−→numbers from 0 to 9, 30−→special characters] no. of different possibilities, and thus 66n no. of different combinations of Straight lines in z-x graph. Each of the point in z-x graph can arbitrarily be on each of the 4 coordinates. So, there are 4npossibilities for each of 66n different possibilities. Finally, the final standard deviation σp depends on the position of average of different σi. There are (n-1) of such partitions.
So, probability of a random password, matching the real password be:
P robability = (6)
For a 8 digit password, this probability is ∼ 6 × 10−21
4 Final Security with AES Algorithm
This process is the final process in the whole system. Here we will use Advanced Encryption Standard (AES) to get the encrypted cipher text [8]. The cipher text will be the actual password in the dynamic password authentication system.
Reasons behind selecting AES encryption for our process:
- AES is one of the most efficient and strongest encryption systems.
- Here we are not much concern of any decryption of the encrypted text (i.e. the password). Hence theres no necessity of choosing asymmetric encryption system like RSA. [9]
- Comparing Twofish encryption system andAES encryption system, Twofish slightly leads in terms of security. But AES is faster than Twofish. Since our system gets high security due to the changeable password, we will allow it to change in the minimum time interval possible. Hence we are choosing
AES for our authentication system. [10]
According to AES system, we will have a plaintext and key of 128 bits and there will be total 10 rounds9 regular rounds and 1 final round.
We will get the plaintext from the standard deviation of the previous mathematics.
Let the output from the mathematics is 6.4467. To have a plaintext of 128 bit (i.e. 16 bytes), the output is multiplied with pi (round 16 bytes decimal). Here the output will be:20.25290535989732. Each digit excluding the point (2, 0, 2, 5, 2, 9, 0, 5, 3, 5, 9, 8, 9, 7, 3, 2) is considered and the corresponding binary digit in 8 bit is calculated (i.e. 00000010, 00000000, 00000010, 00000101, etc). Hence we have 128 bit plaintext.
To get the key, the textual password (here Password) is converted to binary. To get a 128 bit (16 byte) key the textual password will have to be of 16 letters. If the textual password is less than 16 letters then there will be a repetition of letters until it reaches 16 letters. If there is more than 16 letters then there will be excise of letters from right to left until it reaches 16 letters. At the end there will be text to binary conversion.
As for example, for the textual password Password since there is 8 letters, after updating we have PasswordPassword. Hence the key will be: 01010000
01100001 01110011 01110011 01110111 01101111
01110010 01100100 01010000 01100001 01110011 01110011 01110111 01101111 01110010 01100100.
Now we will move for AES algorithm.
The algorithm our system will follow can be described in the figure: [11]
The cipher text we get after whole 10 rounds is the actual password of the system. It is to be noted that we havent done anything with decryption since we are not concerned with the decoding of password to original text.Since the password consists of 128 different characters each having 2 possibilities (0,1), the number of different possible passwords is 2128.
5 Conclusion
In the main work we have already clarified that the concept is secured against most of the common security threats like Brute Force Attack, Timing Attack, Key Logger and Shoulder Surfing Attack. Moreover, it is shown that the Space and Time Complexity of the concept is less than some other common authentication techniques. The whole idea has been developed to make a secure yet simple concept, creating a user-friendly platform. The time interval t between two different traced paths will depend on the time required for the execution of the two encryption algorithms (Feistel Block Cipher and Advanced Encryption Standard technique), along with the completion of the standard deviation. Less is the t, greater is the possibility of having 2 different traced paths in a time interval T, hence greater is the security. The algorithms used in generating the binary password from the graphical traced path are recognised as some secure encryption techniques. Hence they can perform as the final defence as well. At the end we should mention that since we have worked with a completely theoretical concept, it should go through an experimental procedure to detect the flaws and disadvantages.
- Z. Khalid, P. Paul, S. P. Chattopadhyay, A. N. Biswas, Secure Authentication with Dynamic Password, in 2nd IEEE IEMCON and 7th IEEE Annual Information Technology, Electronics and Mobile Communication Conference, Vancouver Canada, 2016.
- C. Kuo , S. Romanosky , L. F. Cranor, Human Selection of Mnemonic Phrasebased Passwords, [online] available- https ://cups:cs:cmu:edu/soups/2006/
- By the editors of Time-Life Books, Computer Security (Understanding Computers),Time-Life Books, 1990.
- F. A. Alsulaiman, A. El Saddak, A Novel 3D Graphical Password Schema, in Virtual Environments, Human-Computer Interfaces and Measurement Systems, Proceedings of 2006 IEEE International, La Coruna Spain, 2006
- W. Stallings, Cryptography and Network Security (Fourth Edition), Pearson Education Inc., 2006 proceedings/p67kuo:pdf ;2006
- C. De Canniere, A. Biryukov, B. Preneel, An Introduction to Block Cipher Cryptanalysis, Proceeding of The IEEE, Vol. 94, No. 2, 2006
- D. J. Griffiths, Introduction to Quantum Mechanics, Prentice Hall, Inc. USA, 1995.
- D. Selent , Advanced Encryption Standard, Rivier Academic Journal, Volume 6, Number 2, 2010
- P. K. Arya, M. S. Aswal, V. Kumar, Comparative Study of Asymmetric Key Cryptographic Algorithms, International Journal of Computer Science & Communication Networks, Volume 5, Issue 1, 2015
- S. A. M. Rizvi, S. Z. Hussain, N. Wadhwa, Performance Analysis of AES and Twofish Encryption Schemein International Conference on Communication Systems and Network Technologies, Katra, Jammu, India, 2011.
- H. Lee, K. Lee, Y. Shin, AES Implementation and Performance Evaluation on 8-bit Microcontrollers, (IJCSIS) International Journal of Computer Science and Information Security, Vol. 6, No. 1, 2009
- Mahdi Madani, El-Bay Bourennane, Safwan El Assad, "Hardware and Secure Implementation of Enhanced ZUC Steam Cipher Based on Chaotic Dynamic S-Box", Advances in Science, Technology and Engineering Systems Journal, vol. 10, no. 1, pp. 37–47, 2025. doi: 10.25046/aj100105
- Rebwar Khalid Muhammed, Kamaran Hama Ali Faraj, Jaza Faiq Gul-Mohammed, Tara Nawzad Ahmad Al Attar, Shaida Jumaah Saydah, Dlsoz Abdalkarim Rashid, "Automated Performance analysis E-services by AES-Based Hybrid Cryptosystems with RSA, ElGamal, and ECC", Advances in Science, Technology and Engineering Systems Journal, vol. 9, no. 3, pp. 84–91, 2024. doi: 10.25046/aj090308
- Sheikh Tareq Ahmed, Annamalai Annamalai, Mohamed Chouikha, "Strengthening LoRaWAN Servers: A Comprehensive Update with AES Encryption and Grafana Mapping Solutions", Advances in Science, Technology and Engineering Systems Journal, vol. 9, no. 1, pp. 33–41, 2024. doi: 10.25046/aj090104
- Javier Calle, Itziar Sagastiberri, Mikel Aramburu, Santiago Cerezo, Jorge García, "Automatic Counting Passenger System using Online Visual Appearance Multi-Object Tracking", Advances in Science, Technology and Engineering Systems Journal, vol. 7, no. 5, pp. 113–128, 2022. doi: 10.25046/aj070514
- Randy Kuang, Dafu Lou, Alex He, Alexandre Conlon, "Quantum Secure Lightweight Cryptography with Quantum Permutation Pad", Advances in Science, Technology and Engineering Systems Journal, vol. 6, no. 4, pp. 401–405, 2021. doi: 10.25046/aj060445
- Joana Cañellas, Anaïs Espinoso, Juan Felipe Ortega, Umberto Melia, Carmen González, Erik Weber Jensen, "Analysis of qCON and qNOX Anesthesia Indices and EEG Spectral Energy during Natural Sleep Stages", Advances in Science, Technology and Engineering Systems Journal, vol. 6, no. 1, pp. 1328–1333, 2021. doi: 10.25046/aj0601152
- Devika K N, Ramesh Bhakthavatchalu, "Modified Blockchain based Hardware Paradigm for Data Provenance in Academia", Advances in Science, Technology and Engineering Systems Journal, vol. 6, no. 1, pp. 66–77, 2021. doi: 10.25046/aj060108
- Takuya Sarugaku, Jun Lee, Yasuaki Matsumoto, Mitsuho Yamada, "Examination of a Skill Sampling Method of an Athlete Using the Athlete’s Movement and Eye Movement for the Development of an AI Coach", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 5, pp. 1204–1213, 2020. doi: 10.25046/aj0505146
- Duc Manh Nguyen, Sunghwan Kim, "A Novel Quantum No-Key Protocol for Many Bits Transfer with Error Correction Codes", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 2, pp. 781–785, 2020. doi: 10.25046/aj050298
- Aditi Haresh Vyas, Mayuri A. Mehta, "A Comprehensive Survey on Image Modality Based Computerized Dry Eye Disease Detection Techniques", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 2, pp. 748–756, 2020. doi: 10.25046/aj050293
- Amine Kardi, Rachid Zagrouba, "Attacks classification and security mechanisms in Wireless Sensor Networks", Advances in Science, Technology and Engineering Systems Journal, vol. 4, no. 6, pp. 229–243, 2019. doi: 10.25046/aj040630
- Farah Nadia Ibrahim, Zalhan Mohd Zin, Norazlin Ibrahim, "Eye Feature Extraction with Calibration Model using Viola-Jones and Neural Network Algorithms", Advances in Science, Technology and Engineering Systems Journal, vol. 4, no. 6, pp. 208–215, 2019. doi: 10.25046/aj040627
- Segundo Moisés Toapanta Toapanta, Gabriel Enrique Valenzuela Ramos, Félix Gustavo Mendoza Quimi, Luis Enrique Mafla Gallegos, "Prototype of a Security Architecture for a System of Electronic Voting for the Ecuador", Advances in Science, Technology and Engineering Systems Journal, vol. 4, no. 4, pp. 292–299, 2019. doi: 10.25046/aj040437
- Segundo Moisés Toapanta Toapanta, Andrés Javier Bravo Jácome, Maximo Giovanny Tandazo Espinoza, Luis Enrique Mafla Gallegos, "An Immutable Algorithm Approach to Improve the Information Security of a Process for a Public Organization of Ecuador", Advances in Science, Technology and Engineering Systems Journal, vol. 4, no. 3, pp. 25–30, 2019. doi: 10.25046/aj040304
- Sherif Said, Samer AlKork, Taha Beyrouthy, Murtaza Hassan, OE Abdellatif, M Fayek Abdraboo, "Real Time Eye Tracking and Detection- A Driving Assistance System", Advances in Science, Technology and Engineering Systems Journal, vol. 3, no. 6, pp. 446–454, 2018. doi: 10.25046/aj030653
- Tao Wu, Ruomei Wang, "Stream Cipher by Reed-Solomon Codes", Advances in Science, Technology and Engineering Systems Journal, vol. 3, no. 4, pp. 26–32, 2018. doi: 10.25046/aj030404
- Abul Kalam Azad, Md. Yamin Mollah, "EAES: Extended Advanced Encryption Standard with Extended Security", Advances in Science, Technology and Engineering Systems Journal, vol. 3, no. 3, pp. 51–56, 2018. doi: 10.25046/aj030307
- Safarul Ilham, Abdul Muin, Dedi Candro, "System Control Device Electronics Smart Home Using Neural Networks", Advances in Science, Technology and Engineering Systems Journal, vol. 2, no. 5, pp. 35–37, 2017. doi: 10.25046/aj020507
- Pryo Utomo, Nadia Widari Nasution, Arisman, Rahmat Widia Sembiring, "A Theoretical and Experimental Comparison of One Time Pad Cryptography using Key and Plaintext Insertion and Transposition (KPIT) and Key Coloumnar Transposition (KCT) Method", Advances in Science, Technology and Engineering Systems Journal, vol. 2, no. 5, pp. 31–34, 2017. doi: 10.25046/aj020506
- Fahrul Ikhsan Lubis, Hasanal Fachri Satia Simbolon, Toras Pangidoan Batubara, Rahmat Widia Sembiring, "Combination of Caesar Cipher Modification with Transposition Cipher", Advances in Science, Technology and Engineering Systems Journal, vol. 2, no. 5, pp. 22–25, 2017. doi: 10.25046/aj020504
- Elwinus H. A. Mendrofa, Elwin Yunith Purba, Boy Yako Siahaan, Rahmad W Sembiring, "Collaborative Encryption Algorithm Between Vigenere Cipher, Rotation of Matrix (ROM), and One Time Pad (OTP) Algoritma", Advances in Science, Technology and Engineering Systems Journal, vol. 2, no. 5, pp. 13–21, 2017. doi: 10.25046/aj020503
- Dewi Sartika Ginting, Kristin Sitompul, Jasael Simanulang, Rahmat Widia Sembiring, Muhammad Zarlis, "Modification of Symmetric Cryptography with Combining Affine Chiper and Caesar Chiper which Dynamic Nature in Matrix of Chiper Transposition by Applying Flow Pattern in the Planting Rice", Advances in Science, Technology and Engineering Systems Journal, vol. 2, no. 5, pp. 6–12, 2017. doi: 10.25046/aj020502
- Amin Subandi, Rini Meiyanti, Cut Lika Mestika Sandy, Rahmat Widia Sembiring, "Three-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm with Keystream Generator Modification", Advances in Science, Technology and Engineering Systems Journal, vol. 2, no. 5, pp. 1–5, 2017. doi: 10.25046/aj020501
- Ali Akbar Pammu, Kwen-Siong Chong, Bah-Hwee Gwee, "A Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation", Advances in Science, Technology and Engineering Systems Journal, vol. 2, no. 3, pp. 420–426, 2017. doi: 10.25046/aj020354
- Abdelhakim Chillali, "Matrix Encryption Scheme", Advances in Science, Technology and Engineering Systems Journal, vol. 2, no. 4, pp. 56–58, 2017. doi: 10.25046/aj020408
- Shinya Mochiduki, Miyuki Suganuma, Gaito Shoji, Mitsuho Yamada, "Development of a new lines of sight analyzer while playing sport", Advances in Science, Technology and Engineering Systems Journal, vol. 2, no. 1, pp. 167–171, 2017. doi: 10.25046/aj020119


