Authentication Mechanism using Encrypted One time Password (EOTP)

Authors

  • Pathak A Department of Computer Science Engineering, Girijananda Chowdhury Institute of Management and Technology, Guwahati, India
  • Barmen U Department of Computer Science Engineering, Girijananda Chowdhury Institute of Management and Technology, Guwahati, India
  • Keot SK Department of Computer Science Engineering, Girijananda Chowdhury Institute of Management and Technology, Guwahati, India
  • Boro P Department of Computer Science Engineering, Girijananda Chowdhury Institute of Management and Technology, Guwahati, India.

Keywords:

Network Security, Authentication, Public key, Private key, Cryptography, Encrypted one time password(EOTP)

Abstract

Authentication system is the mechanism of proving the access to authorize users only and to prevent the various security threats. In the various one time passwords based (OTP) systems are third party dependents such as mobile, emails etc. In this paper we will discuss about the problems associated with various authentication techniques and a proposed system which is independent of third party and highly secured.

References

. R . L. Rivest, A. Shamir and L. Adleman, "On Digital Signatures and Public Key Cryptosystems", Technical Memo 82, Laboratory for Computer Science, Massachusetts Institute of Technology, April 1970.

. National Institute of Standards and Technology (NIST) U.S.Department of Commerce: Electronic Authentication Guideline-Information Security, Special Publication 800-63-1, December 8,

. W. E. Burr, D. F. Dodson, W. T. Polk. ElectronicAuthentication Guideline. Technical Report 800-63, National Institute of Standards andTechnology,2008.<http://csrc.nist.gov/publications/nistpubs/800SP800-63V1_0_2.pdf>.

. CA.Managing strong Authentication: A Guide to Creating an Effective Management System, 2007. Dwiti Pandya, Khushboo Ram Narayan, Sneha Thakkar,Tanvi Madhekar nad B.S. Thakare, “An Overview of Various Authentication Methods and Protocols” in International Journal of Computer Applications (0975 – 8887) Volume 131 – No.9, December2015.

. Geetanjali Choudhury and Jainul Abudin, “Modified Secure Two Way Authentication System in Cloud Computing Using Encrypted One Time Password” International Journal of Computer Science and Information Technologies, Vol. 5 (3) , 2014, 4077-4080.

. Jainul Abudin, Sanjay Kumar Keot, Geetanjali Malakar, Nita Moni Borah and Mustafizur Rahman, “Modified RSA Public Key Cryptosystem Using Two Key Pairs” (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3) , 2014, 3548-3550.

Downloads

Published

2025-11-11

How to Cite

[1]
A. Pathak, U. Barmen, S. K. Keot, and P. Boro, “Authentication Mechanism using Encrypted One time Password (EOTP)”, Int. J. Comp. Sci. Eng., vol. 4, no. 7, pp. 150–153, Nov. 2025.