A new optical one-time password (OTP) authentication method using digital holography is proposed, which enhances security strength in the authentication system. A challenge-response optical OTP algorithm based on two-factor authentication is presented using two-step phase-shifting digital holography, and two-way authentication is also performed using challenge-response handshake in both directions. Identification (ID), password (PW), and OTP are encrypted with a shared key by applying phase-shifting digital holography, and these encrypted pieces of information are verified by each party by means of the shared key. The encrypted digital holograms are obtained by Fourier-transform holography and are recorded on a CCD with 256 quantized gray-level intensities. Because the intensity pattern of such an encrypted digital hologram is distributed randomly, it guards against a replay attack and results in higher security level. The proposed method has advantages, in that it does not require a time-synchronized OTP, and can be applied to various authentication applications. Computer experiments show that the proposed method is feasible for high-security OTP authentication.
In recent years, various services such as online banking, cyber stock exchange, and electronic commerce have been provided through communication networks for the Internet and mobile phones. Accordingly, we access to the Internet many times a day by getting a login and exchanging personal information, such as ID and PW. Conventional methods for authentication use the following things: what you know (i.e. ID, PW), who you are (i.e. fingerprint, DNA, iris pattern), or what you have (i.e. OTP). However, due to the development of hacking techniques, authentication based on ID and PW reveals the imperfection of such systems, and its security level has been degraded. To avoid disclosing ID and PW, one-time password (OTP) was invented to ensure authentication [1]. The OTP is a disposable password that allows a client to get a login for a server system. However, the OTP method has a weakness: interception by an unauthorized intruder. Since the OTP is the essence of most authentication systems, it is very important to protect the OTP. Some algorithms use two-factor authentication, which can be performed with a combination of two factors from ‘what you know’ and ‘what you have’, to increase security level. This presents a problem for challenge-response algorithms, though, which require both client and server to have a shared secret [2]. To hide OTPs in two-factor authentication, OTP encryption is more effective than using the unencrypted OTP alone. In general, conventional electronic cryptographic systems treat binary data, but these methods involve lots of computation and are not fast enough for high-volume data. Recently, various kinds of optical encryption methods have been proposed for security systems, as optical systems offer parallel and fast processing [3-10]. One method of optical encryption uses optical holography [11, 12]. However, this method makes it difficult to deal with the encrypted information over a digital network, owing to the analog signal of a complex function with phase and amplitude. To overcome this problem, optical encryption techniques using phase-shifting digital holography are used to record and reconstruct the complex values of a hologram digitally [13-15]. In particular, we have presented some papers on optical encryption using phase-shifting digital holography [16-21].
In this paper we propose a new security-enhanced optical OTP authentication method using two-step quadrature phase-shifting digital holography based on orthogonal polarization, and show its feasibility for OTP authentication. In the proposed method, a new challenge-response optical OTP protocol based on two-factor authentication is presented, and two-way authentication is performed using the challenge-response handshake in both directions. In Section II, the proposed OTP authentication and its optical implementation are described. In Section III, computer experiments show results of optical OTP authentication using the proposed method. Finally, conclusions are briefly summarized in Section IV.
2.1. The Proposed OTP Authentication
To cope with the security weakness of single-password authentication, in which the same password is reused repeatedly, an OTP is widely used as a disposable password to authenticate clients. The OTP is a password that is valid for only one login session or transaction, providing high security against man-in-the-middle attacks based on replaying a captured password: The OTP is invulnerable to replay attack, because a hacked OTP that was already used is no longer valid. Methods of generating an OTP are classified as synchronous and asynchronous protocols, according to whether or not the authentication server and the client are synchronized. The synchronous approach is divided into time-synchronization and event-synchronization methods. Time-synchronization authentication is an algorithm that computes OTPs from a shared secret key plus the current time, and in which OTPs are valid only for a short period of time between the server and the client. This method does not require the server’s challenge value. Event-synchronization authentication uses a mathematical algorithm to generate a new password associated with the previous password, in which OTPs are effectively generated by a one-way hash chain and must be used in a predefined order, starting from an initial seed. The merit of this method is that if the one-way function is a cryptographic hash function, decrypting it is computationally infeasible. However, it requires synchronization of the OTP generation number between server and client. Meanwhile, asynchronous authentication is a challenge-response protocol that uses a mathematical algorithm in which the server presents a question (challenge), and the client must provide a valid answer (response) to be authenticated. The advantages of this method are that it is easy to implement and does not demand synchronization between server and client. However, this challenge-response algorithm does require client and server to have a shared secret.
Figure 1(a) shows a protocol for conventional electronic challenge-response OTP authentication. The authentication server verifies the client using the OTP protocol. After authentication, a secret key is sent from server to client and is used to encrypt the client’s data, which later will be decrypted by the server with the shared secret key. To access the server, a client sends ID and PW to the authentication server (Request). The authentication server checks the client’s ID and PW and sends the client the seed and sequence, which includes the OTP generation parameter (Challenge). Next the client generates an OTP, produced through multiple iterations of a secure hash function along with a seed and sequence, and then sends it to the server (Response). The server verifies the OTP by computing the secure hash function and comparing the result with the previously accepted OTP. After authentication, the home server delivers a secret key for encrypting the client’s data. This key may be generated and shared by the Diffie-Hellman key-exchange agreement protocol.
Although OTP authentication is in some ways more secure than a static fixed password, it is still vulnerable to man-in-the-middle attacks, so OTPs should not be disclosed to any eavesdroppers. OTP encryption and layered security are recommended in order to hide an OTP; these methods are more secure than using an unencrypted OTP. Two-factor authentication is a form of layered security, consisting of ID, PW, and OTP. Layered security such as two-factor authentication is safer than using only one-factor of security during login process.
For this reason, we propose a new challenge-response OTP method based on two-factor authentication. The layered security is implemented using an encrypted OTP, in combination with an encrypted ID and PW that are stored in memory. In addition, two-way (mutual) authentication is performed using the challenge-response handshake in both directions. The server confirms that the client knows the shared secret, and the client also confirms that the server knows it, which protects against a fake server impersonating the true server.
Figure 1(b) shows the protocol for the proposed challenge-response OTP authentication and secret key delivery. At the start of accessing the server, the client sends to the authentication server an encrypted ID and PW, acquired by encrypting the ID and PW with a private key (Request). The authentication server decrypts the client’s ID and PW with the same private key, then encrypts the private key with the shared key which is computed with the cipher transmitted by the client, and sends it to the client (Check). The encrypted private key is decrypted with the same shared key that was generated in the previous ‘Request’ encryption stage, and checks whether the server is genuine or false. If the decrypted result is not same as the private key that was used in the previous encryption of the ID and PW, then the server is false. After verifying a genuine server, the client sends another encrypted ID and PW with another shared key, computed using the cipher transmitted from the server, and sends it to the server (Acknowledge). The server decrypts the encrypted ID and PW with the same shared key that was generated in the previous ‘Check’ encryption stage, and verifies the client’s ID and PW again. After that, the server sends an encrypted OTP seed that is produced with another shared key and will be used to generate an OTP at the client (Challenge). The encrypted OTP seed is decrypted using the same shared key that was generated in the previous ‘Acknowledge’ encryption stage, and the client generates an encrypted OTP from the decrypted OTP seed and sends it to the server (Response). After decryption of the OTP with the same shared key, the server authenticates the client by comparing the result with the previously generated OTP seed. Finally, the home server allows the client a login, and delivers a secret key to encrypt the client’s data.
2.2. Optical Implementation of the Proposed OTP Authentication
The principal idea in this paper is that the OTP authentication is optically implemented by means of a digital holographic technique [22]. This is accomplished by two-step quadrature phase-shifting digital holography based on orthogonal polarization to encrypt and transmit a client’s ID, PW, and OTP to the server. These encrypted ID, PW, and OTP are then decrypted by the server and used to verify the client. For the proposed OTP authentication, we use a two-step quadrature phase-shifting holographic optical setup that employs simply two polarizers and one phase retarder to produce the quadrature phase shifting [21]. Figure 2 is the optical schematic for the proposed OTP authentication using two-step phase-shifting digital holographic optical encryption. Schematically, the optical setup contains a quarter-wave plate (λ/4-plate). It is used as a phase retarder, which generates
The encryption and decryption principle using two-step quadrature phase-shifting digital holography is described in Refs. [20, 21]. If Fourier-transformed functions of a binary plain text
then the two-step quadrature phase-shifting digital holographic method gives two interference intensities recorded on the CCD in the form of a digital hologram:
where Δ
where
From Eqs. (5) and (6), the complex hologram with encryption information is expressed as
Using this complex hologram and the encryption key information of
Figure 3 shows block diagrams of the proposed security-enhanced optical OTP authentication method using phase-shifting digital holography. The proposed system consists of a secure bi-directional communication channel. The encrypted information is transmitted to the other side. In Fig. 3, the phase-shifting digital holographic encryption is optically implemented by two-step quadrature phase-shifting digital holography based on orthogonal polarization, according to the optical schematic shown in Fig. 2. The encrypted ID, PW, and OTP seed are decrypted by the server and the client respectively. First, Fig. 3(a) shows the encryption/decryption procedure for the request and OTP seed. A client’s ID and PW are encrypted with the private key and transmitted to an authentication server. The private key is a kind of symmetric key that is needed to perform a block encryption algorithm at the beginning of the process. Basically, this private key is generated from a secret shared key derivation function after installing the authentication application in registration, and is stored in memory. When the first request comes to the server, it is used to decrypt the cipher of the ID and PW. The encrypted digital holograms are acquired from the intensities recorded on CCDs in the optical setup, transmitted to the other party, and changed into shared keys in each encryption/decryption session. The OTP seed has information about OTP generation parameters, which will be used to generate an OTP at the client. In this paper the OTP seed is chosen to be the same as the OTP itself intentionally, because the OTP encrypted with the shared key can be regarded as a kind of OTP seed. Second, Fig. 3(b) shows the encryption/decryption procedure for the OTP authentication and secret key. The OTP generated by the client is encrypted with the shared key and transmitted to the server. The secret key generated from the server is also a symmetric key that is needed to perform a block encryption algorithm on the client’s data. This secret key is typically generated randomly, to ensure strong cryptographic security.
Figure 4 shows the flowchart for the security-enhanced optical OTP authentication method, which performs two-way authentication. Many cryptographic solutions involve two-way authentication, where client and server must each convince the other that they know the shared secret. In this paper the shared keys play a role in encryption and decryption. The transmitted digital holograms that are encrypted by the other party are modified into these shared keys via the proper threshold value, and these shared keys are never transmitted over the communication channel, where eavesdroppers might be lurking. The proposed security-enhanced optical OTP authentication method includes three rounds for authentication. The first round is to confirm the client’s ID and PW with the private key, which is expressed by ‘Request’ in session 2.1. After the client enters the ID and PW, the client retrieves the private key from storage for (Request) encryption of the ID and PW, and remembers it. The server will retrieve the same private key from storage and validate the ID and PW. The second round is to confirm the server’s private key with the shared key1, and to send another encrypted ID and PW with the shared key2, which is expressed by (Check) and (Acknowledge). If the decrypted result at the client is not same as the private key that was used in the previous ‘Request’ stage, the client restarts the first round of ‘Request’. The server decrypts the encrypted client’s ID and PW with the same shared key2 that was generated in the previous ‘Check’ stage, and verifies the client’s ID and PW again. If the decrypted result at the server is not same as the client’s ID and PW that were confirmed in the previous ‘Request’ stage, the server rejects the client. When ‘Acknowledge’ comes to the server, it turns on the algorithm to generate the OTP seed and store it for validation of the OTP. The third round is to decrypt the server’s OTP seed with the shared key3, and to respond by sending the OTP with the shared key4, which is expressed by (Challenge) and (Response). If the decrypted result at the server is the same as the OTP that was used in the previous ‘Challenge’ stage, the server authenticates the client. The last generated shared key code is cached by the client and the server as a new private key, and will be used for the next ‘Request’ encryption in the process of authentication and identity verification.
During the two-way authentication process, the encrypted digital holograms that are transmitted to the other party have random form. Using information that represents a random pattern in each exchange guards against the possibility of a replay attack. Also, if the encryption key is truly random and never reused, and kept completely secret, then the resulting cipher will be impossible to decrypt or break. In this paper we can make use of randomness in the OTP seed and OTP generation algorithms. It would be difficult to predict future OTPs by observing previous ones, and the shared keys that are produced from the encrypted digital holograms are stored in memory for the next encryption and decryption.
To prove the validity of the proposed security-enhanced optical OTP authentication method, we check its performance by computer experiments with two-step quadrature phase-shifting digital holography based on orthogonal polarization.
Figure 5(a) shows a client’s ID and PW, which represents binary data code from ASCII code conversion, and Fig. 5(b) shows a binary image representation with zero padding of the client’s ID+PW to be encrypted, the size of which is 64 × 64 pixels. Figure 5(c) shows a private key of 64 × 64 pixels, which for convenience is a randomly generated binary bit pattern. The client’s ID + PW is encrypted with the private key in the ‘Request’ stage.
Figure 6 shows example intensity histograms for the encrypted digital holograms, obtained using two-step phase-shifting digital holography to encrypt the client’s ID+PW shown in .Fig. 5(b) with the private key shown in Fig. 5(c). Each digital hologram is recorded on the CCD and quantized using 256 gray levels. Figures 6(a) and (b) show the encrypted client’s ID+PW when the phase shift is 0 and π/2 respectively. These encrypted holograms have a noise-like, uniformly random distribution. Figures 6(c) and (d) respectively show the DC term of the encrypted client’s ID+PW and the DC term of the encrypted private key, which are obtained by recording the object and reference beams separately. Figures 6(e) and (f) respectively are the modified intensities of Figs. 5(a) and (b), after DC term removal.
Figure 7 shows one example of complex hologram (H1) information, which is calculated from the four transmitted, encrypted digital holograms shown in Figs. 6 (a)~(d). The reconstructed amplitude and phase maps are shown in Figs. 7(a) and (b) respectively.
From the complex hologram (H1), reconstruction and decryption of the encrypted ID and PW are carried out successfully. Figure 8 shows the result of decryption of the client’s ID + PW when the same (correct) private key is used. Figure 8(a) is the reconstructed image pattern obtained from complex hologram (H1) and the same private key, and Fig. 8(b), which is the correctly decrypted binary image of the client’s ID + PW after binarization with the proper threshold value, is exactly same as the client’s ID + PW shown in Fig. 5(b).
Figure 9 shows one example of the shared key1 that is generated by the complex hologram (H1). The reconstructed amplitude image pattern of the complex hologram (H1) is shown in Fig. 9(a), which is the same as Fig. 7(a). The shared key1 after binarization with the proper threshold value is shown in Fig. 9(b). The server’s private key is encrypted using this shared key1 in the ‘Check’ stage.
The server’s private key is decrypted with this shared key1; Fig. 10 shows the result of decryption of the server’s private key when the same shared key1 is used. Figure 10(a) is the reconstructed image pattern obtained from complex hologram (H2) and the same shared key1, and Fig. 10(b), which is the correctly decrypted binary image of the server’s private key after binarization with the proper threshold value, is exactly same as the client’s private key shown in Fig. 5(c).
After checking the true server, the client’s ID+PW is encrypted again with the shared key2 in the ‘Acknowledge’ stage. Figure 11 shows the result of decryption of the client’s ID+PW when the same shared key2 is used. Figure 11(a) is the reconstructed image pattern obtained from complex hologram (H3) and the same shared key2, and Fig. 11(b), which is the correctly decrypted binary image of the client’s ID + PW after binarization with the proper threshold value, is exactly same as the client’s ID+PW shown in Fig. 5(b).
After verifying the true client, the server’s OTP seed is encrypted with the shared key3 in the ‘Challenge’ stage. Figure 12 shows the result of decryption of the server’s OTP seed when the same shared key3 is used. Figure 12(a) is a binary number image representation with zero padding of the server’s OTP seed to be encrypted, and Fig. 12(b) is the reconstructed image pattern obtained from complex hologram (H4) and the same shared key3. Figure 12(c) shows the correctly decrypted binary image of the server’s OTP seed after binarization with the proper threshold value, which is exactly same as the server’s OTP seed shown in Fig. 12(a).
After checking the server’s OTP seed, the client’s OTP is encrypted with the shared key4 in the ‘Response’ stage. Figure 13 shows the result of decryption of the client’s OTP when the same shared key4 is used. Figure 13(a) is the reconstructed image pattern obtained from complex hologram (H5) and the same shared key4, and Fig. 13(b), which is the correctly decrypted binary image of the client’s OTP after binarization with the proper threshold value, is exactly same as the server’s OTP seed shown in Fig. 12(a). In this paper, the OTP is chosen to be the same as the OTP seed because the OTP encrypted with the shared key can be regarded as a kind of OTP seed.
After decrypting and checking the client’s OTP, the home server enables the client to get into a log in, and delivers a secret key encrypted using the shared key5 for the client’s data encryption. Figure 14. shows the result of decryption of the server’s secret key when the same shared key5 is used. Figure 14(a) is a randomly generated binary bit pattern as a secret key for simulation, and Fig. 14(b) is the reconstructed image pattern obtained from complex hologram (H6) and the same shared key5. Figure 14(c) shows the correctly decrypted binary image of the server’s secret key after binarization with the proper threshold value, which is exactly same as the server’s secret key shown in Fig. 14(a).
After decrypting the server’s secret key, the client encrypts binary data with this secret key. Figure 15 shows the result of decryption of the client’s data when the same secret key is used for decryption. Figure 15(a) is a binary image representation of the client’s data to be encrypted, and Fig. 15(b) is the reconstructed image pattern obtained from complex hologram (H7) and the same secret key. Figure 15(c) shows the correctly decrypted binary image of the client’s data after binarization with the proper threshold value, which is exactly same as the client’s data shown in Fig. 15(a).
A new optical OTP authentication method using phase-shifting digital holography is proposed, which enhances the security level of authentication, compared to the conventional electronic OTP method. Optical encryption of the ID, PW, and OTP for authentication is performed by implementing two-step quadrature phase-shifting digital holography based on orthogonal polarization. The proposed optical phase-shifting digital holographic system generates the encrypted digital holograms, which are Fourier-transform holograms recorded on CCDs with 256 gray-level quantized intensities and then transmitted. These encrypted digital holograms are used as cipher texts to generate a shared secret key. Also, a new challenge-response optical OTP method based on two-factor authentication is presented, which is a layered security method using an encrypted OTP in combination with an encrypted ID and PW. The exchange of such encrypted ID, PW, and OTP information does not directly reveal the password to an eavesdropper. In addition, two-way authentication is performed using challenge-response handshake in both directions. During the two-way authentication process, the encrypted digital holograms transmitted to the other party have the form of a random pattern. The use of randomness protects against a man-in-the-middle attack, and the possibility of a replay attack. The proposed method also provides unconditional choice of the randomly generated disposable OTP without confinement, which means all authentication servers can alter independent OTPs at their own discretion. Advantages of the proposed OTP authentication system are impossibility of password-reuse attack, unpredictability of OTP generation, confidentiality, and convenient authentication without synchronization. Computer experiments verify that the proposed method allows highly secure OTP authentication applications.