Paper
10 March 2015 Security enhanced optical one-time password authentication method by using digital holography
Sang Keun Gil, Seok Hee Jeon, Jong Rae Jeong
Author Affiliations +
Abstract
We propose a new optical one-time password(OTP) authentication method by using digital holography, which enhances security strength in the cryptosystem compared to the conventional electronic OTP method. In this paper, a challenge-response optical OTP authentication based on two-factor authentication is presented by 2-step quadrature phase-shifting digital holography using orthogonal polarization, and two-way authentication is also performed using the challenge-response handshake in both directions. The ID (identification), PW (password) and OTP information are encrypted with a shared key by applying phase-shifting digital holography, and these encrypted information are verified each other by the shared key. Because the encrypted digital holograms which are transmitted to the other party are expressed as random distribution, it guards against a replay attack and results in higher security level. Optically, encrypted digital hologram in our method is Fourier transform hologram and is recorded on CCD with 256 gray-level quantized intensities. The proposed method has an advantage that it does not need a time-synchronized OTP and can be applied to various security services. Computer experiments show that the proposed method is suitable for high secure OTP authentication.
© (2015) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Sang Keun Gil, Seok Hee Jeon, and Jong Rae Jeong "Security enhanced optical one-time password authentication method by using digital holography", Proc. SPIE 9386, Practical Holography XXIX: Materials and Applications, 93860U (10 March 2015); https://doi.org/10.1117/12.2080594
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Digital holography

Phase shifts

Symmetric-key encryption

Holograms

Binary data

3D image reconstruction

Computer security

Back to Top