{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T00:13:13Z","timestamp":1651882393978},"reference-count":25,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,4,1]]},"abstract":"<p>Many financial institutions interact with their customers via short message services (SMS), which is today one of the fastest and most powerful means of communicating information around the world. This information can sometimes be an access code such as the unique password (OTP) for two-factor authentication (2FA) or banking information and personal identities. All this data is confidential, and it is a major disadvantage to send them since an SMS service does not provide data encryption during network transmission and on mobile. Recently, OTPs via SMS have suffered from strong attacks that intercept messages. In order to avoid attacks and offer effective content security to 2FA credentials sent via SMS, the authors propose an SMS encryption mechanism using a post quantic cryptosystem quasi-cyclic MDPC and an electronic signature of the OTPs. Finally, this article performs an implementation and a security analysis of the proposal.<\/p>","DOI":"10.4018\/ijisp.2020040106","type":"journal-article","created":{"date-parts":[[2020,1,24]],"date-time":"2020-01-24T15:57:54Z","timestamp":1579881474000},"page":"102-115","source":"Crossref","is-referenced-by-count":0,"title":["Securing Communication 2FA Using Post-Quantic Cryptosystem"],"prefix":"10.4018","volume":"14","author":[{"given":"Kouraogo","family":"Yacouba","sequence":"first","affiliation":[{"name":"LabMiA-SI, Faculty of Sciences, Mohammed V University in Rabat, Rabat, Morocco"}]},{"given":"Orhanou","family":"Ghizlane","sequence":"additional","affiliation":[{"name":"LabMiA-SI, Faculty of Sciences, Mohammed V University in Rabat, Rabat, Morocco"}]},{"given":"Elhajji","family":"Said","sequence":"additional","affiliation":[{"name":"LabMiA-SI, Faculty of Sciences, Mohammed V University in Rabat, Rabat, Morocco"}]}],"member":"2432","reference":[{"key":"IJISP.2020040106-0","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_27"},{"key":"IJISP.2020040106-1","first-page":"641","article-title":"Two factor authentication using mobile phones","author":"F.Aloul","year":"2009","journal-title":"International Conference Computer Systems and Applications"},{"key":"IJISP.2020040106-2","unstructured":"Arnault, F. (n.d.). Theorie des nombres et cryptographie. Retrieved from http:\/\/www.unilim.fr\/pages\/_perso\/francois.arnault\/documents\/polycrypto.ps"},{"issue":"6","key":"IJISP.2020040106-3","first-page":"1121","article-title":"Maintaining User-Level Security in Short Message Service, International Journal of Computer, Electrical, Automation","volume":"10","author":"T.Arudchelvam","year":"2016","journal-title":"Control and Information Engineering"},{"key":"IJISP.2020040106-4","doi-asserted-by":"crossref","unstructured":"Brown, J., Shipman, B., & Vetter, R. (2007). SMS: The short message service.","DOI":"10.1109\/MC.2007.440"},{"key":"IJISP.2020040106-5","doi-asserted-by":"crossref","unstructured":"Dmitrienko, A., Liebchen, C., Rossow, C., & Sadeghi, A. R. (2014). On the (in)security of mobile two-factor authentication. Proceedings of the International Conference on Financial Cryptography and Data Security. Springer.","DOI":"10.1007\/978-3-662-45472-5_24"},{"key":"IJISP.2020040106-6","doi-asserted-by":"crossref","unstructured":"Eldefrawy, M. H., Khan, M. K., Alghathbar, K., Kim, T. H., & Elkamchouchi, H. (2012). Mobile one\u2010time passwords: two\u2010factor authentication using mobile phones. Proceedings of theInternational Conference Security and Communication Networks (pp. 508-516). Academic Press.","DOI":"10.1002\/sec.340"},{"key":"IJISP.2020040106-7","unstructured":"Hall, T. A., & Keller, S. S. (2010). The FIPS 186-4 Elliptic Curve Digital Signature Algorithm Validation System (ECDSA2VS)."},{"issue":"4","key":"IJISP.2020040106-8","article-title":"Review on SMS Encryption using MNTRU Algorithms on Android. International Journal of Computer Science and Information Technologies","volume":"6","author":"S.Jha","year":"2015","journal-title":"International Journal of Computer Science and Information Technologies"},{"key":"IJISP.2020040106-9","first-page":"1","article-title":"The survey of various techniques & algorithms for SMS security.","author":"S. N.Karale","year":"2015","journal-title":"Proceedings of the 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)"},{"key":"IJISP.2020040106-10","doi-asserted-by":"publisher","DOI":"10.1145\/3078810.3078815"},{"key":"IJISP.2020040106-11","unstructured":"Klein, A. (2012). The Song Remains the Same: Man in the Mobile Attacks Single out Android. Security Intelligence. Retrieved from https:\/\/securityintelligence.com\/man-in-the-mobile-attacks-single-out-android"},{"key":"IJISP.2020040106-12","doi-asserted-by":"publisher","DOI":"10.1504\/IJIE.2017.087014"},{"key":"IJISP.2020040106-13","doi-asserted-by":"publisher","DOI":"10.4018\/IJISP.2017070102"},{"key":"IJISP.2020040106-14","unstructured":"Maslennikov, D. (n.d.). ZeuS in the Mobile is back. Retrieved from https:\/\/securelist.com\/zeus-in-the-mobile-is-back\/29830\/"},{"key":"IJISP.2020040106-15","doi-asserted-by":"crossref","first-page":"2069","DOI":"10.1109\/ISIT.2013.6620590","article-title":"MDPC-McEliece: New McEliece variants from moderate density parity-check codes.","author":"R.Misoczki","year":"2013","journal-title":"Proceedings of the 2013 IEEE international symposium on information theory"},{"key":"IJISP.2020040106-16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39235-1_9"},{"key":"IJISP.2020040106-17","unstructured":"Olenski, J. (2015). ECC 101: What is ECC and why would I want to use it? GlobalSign GMO Internet Group. Retrieved from https:\/\/www.globalsign.com\/en\/blog\/elliptic-curve-cryptography"},{"key":"IJISP.2020040106-18","first-page":"501","article-title":"(","author":"J.Pan","year":"2012","journal-title":"Second International Conference on Instrumentation, Measurement, Computer, Communication and Control (IMCCC)"},{"issue":"4","key":"IJISP.2020040106-19","first-page":"1211","article-title":"SMS based mobile banking","volume":"4","author":"S.Pujitha","year":"2013","journal-title":"International Journal of Engineering Trends and Technology"},{"key":"IJISP.2020040106-20","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/423930"},{"issue":"2","key":"IJISP.2020040106-21","first-page":"285","article-title":"Securing SMS using cryptography.","volume":"4","author":"S.Rangarajan","year":"2013","journal-title":"International Journal of Computer Science and Information Technologies"},{"key":"IJISP.2020040106-22","author":"P.Schartner","year":"2011","journal-title":"Attacking mTAN-applications like e-banking and mobile signatures"},{"key":"IJISP.2020040106-23","first-page":"373","article-title":"Two factor authentication using EEG augmented passwords","author":"I.\u0160vogor","year":"2012","journal-title":"International Conference In Information Technology Interfaces (ITI)"},{"key":"IJISP.2020040106-24","doi-asserted-by":"publisher","DOI":"10.4018\/IJISP.2017070103"}],"container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=247429","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T23:52:57Z","timestamp":1651881177000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJISP.2020040106"}},"subtitle":["Case of QC-MDPC- Mceliece Cryptosystem"],"short-title":[],"issued":{"date-parts":[[2020,4,1]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijisp.2020040106","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"value":"1930-1650","type":"print"},{"value":"1930-1669","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,1]]}}}