You are on page 1of 7

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/279491324

Multi-Channel User Authentication Protocol based on Encrypted Hidden OTP

Article · June 2015

CITATIONS READS
8 510

4 authors:

Ashraf Aboshosha Kamal Eldahshan


ICGST LLC Al-Azhar University
231 PUBLICATIONS 282 CITATIONS 82 PUBLICATIONS 275 CITATIONS

SEE PROFILE SEE PROFILE

Eman Elsayed Ahmed A. Elngar


Al-Azhar University Beni Suef University
34 PUBLICATIONS 79 CITATIONS 187 PUBLICATIONS 658 CITATIONS

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

MARCONI 1 View project

Meta-heuristic Algorithms View project

All content following this page was uploaded by Ashraf Aboshosha on 01 July 2015.

The user has requested enhancement of the downloaded file.


(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 13, No. 6, June 2015

Multi-Channel User Authentication Protocol based on Encrypted Hidden OTP

Ashraf Aboshosha Kamal A. ElDahshan Eman K. Elsayed Ahmed A. Elngar

NCRRT Faculty of Science Faculty of Science (Girls) Faculty of Science


Atomic Energy Authority Al-Azhar University Al-Azhar University Al-Azhar University
Cairo, Egypt Cairo, Egypt Cairo, Egypt Cairo, Egypt
editor@icgst.com dahshan@gmail.com emankaram10@hotmail.com elngar 7@yahoo.co.uk

Abstract—Remote user authentication plays the most fun- the attackers which lead to compromise the authentication
damental procedure to identify the legitimate users of a schemes [7]. Thus, using one time password (OTP) is an
web service on the Internet. In general, the password-based efficient way to secure the authentication scheme. Where,
authentication mechanism provides the basic capability to
prevent unauthorized access. Since, many researchers have OTP is the identity password of a user which changes with
proposed a number of password based authentication schemes every user login [8].
which rely on a single channel for authentication. However to
achieve a better security, it is possible to engage multi-channels
for authenticating users. In this paper, we propose an efficient This paper proposed one time password (OTP) authen-
one time password (OTP) based authentication protocol over tication protocol for remote user login. Where, the plain-
a multi-channels architecture. Where, the proposed protocol OTP is encrypted in the form of cipher-OTP using RC4-EA
employing the RC4-EA encryption method to encrypt the plain- encryption method in order to keep it secret [9]. Since the
OTP to cipher-OTP. Then, Quick Response Code (QR) code crypt-systems have over grown, it would not be enough to
is used as a data container to hide this cipher-OTP. Also, the
purpose of the protocol is integrate a web based application encrypt the stuffed contents of the plain-OTP. Hence, we
with mobile-based technology to communicate with the remote need to work on the inevitability that its existence should be
user over a multi-channels authentication scheme. The main kept secret. Thus, Quick Response code(QR) code is used as
advantage of the proposed protocol is to highly secure the a data container to hide the cipher-OTP [10]. Also, to ensure
authentication system by preventing the OTP from eaves- safe and secure remote user authentication, multi-channels
dropping attack. Also, by integrating a Web-based application
with mobile-based technology as a multi-channels scheme; the authentication (MCAs) is used [11]. Where, the idea behind
proposed protocol helps to overcome many challenging attacks using MCA is to ensure integrity and authenticity of user
such as replay attack, DoS attack, man-in-the-middle (MITM) authentication [12] . So that, for an attacker to compromise
attack, real-time phishing (RTP) and other malware attacks. a user account; different independent channels have to be
Keywords-Authentication; Multi-Channel Authentication compromised first before gaining full access to the user
(MCA); Data hiding; Quick Response Code (QR) code; account [13].
Encryption.

I. I NTRODUCTION The advantages of the proposed user authentication


Internet has become the most convenient environment for protocol are to prevent the OTP from eavesdropping
businesses, education, bill-paying and E-commerce around attack by adopting the RC4-EA encryption method and
the world [1]. Thus, internet security is an important issue the QR-code technique. Also, to overcome the drawback
to prevent the confidential information from being accessed of the man-in-the-middle/browser (MITM/B), real-time
by unauthorized users [2]. Remote authentication of users is phishing/pharming (RTP/P) and malware attacks; by
recently one of the most important service on the internet. integrating a Web-based application with mobile-based
Where, remote user authentication is the process of identi- technology as a multi-channels.
fying a legitimate user of a particular web service on the
internet[3].
Most authentication schemes using a smart card, debit The rest of this paper is organized as follows: Section II
card, or Asynchronous Transfer Mode (ATM) to restrict a presents an overview of one time password technique (OTP),
resources [4]. These schemes are impractical due to their Dynamic RC4-EA encryption method, Data hiding using
infrastructure requirements [5]. According to their low cost, QR-Code and Multi-Channels based authentication. Section
efficiency and portability, Passwords are the most common III introduces the proposed authentication protocol. Section
and convenient way to authenticate the remote user [6]. IV gives the implementation and security analysis. Finally,
However, such passwords become a sensitive target for Section V contains the conclusion remarks.

14 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 13, No. 6, June 2015

II. A N OVERVIEW well as some information bits that will tell a QR decoder
A. One Time Password Technique (OTP) what type of QR Code it is. After generating the string
of bits; the Reed-Solomon technique is used to generate
One Time Password (OTP) authentication is used to pro-
Error Correction [21]. The resultant data from string of
vide the security of websites and to minimizes the potential
bits and the Error Correction is used to generate eight
of unauthorized access [14]. The concept behind OTP that;
different QR Codes, Each of which uses a different mask
it can be used only one time, where it is only valid for one
pattern. A mask pattern controls and changes the pixels
login session or for a very short period of time [15]. Even
to black 0 or White 1. Which makes sure that the QR
if an attacker is capable of obtaining this user credential
code doesn’t contain patterns that might be difficult for
OTP, it may either no longer be valid or be prohibited from
a QR decoder to read [21]. Finally, the QR Code which
additional use . OTP can help in mitigating a typical phishing
uses the best mask pattern is generated as shown in figure 1.
attempt or a replay attacks[16]. A various algorithms for the
generation of OTPs are listed below [14]:
1) Based on time-synchronization between the authenti-
cation server and the client providing the password,
where OTPs are valid only for a short period of time.
2) Using a mathematical algorithm to generate a new
password based on the previous password, where
OTPs are effectively a chain and must be used in a
predefined order.
3) Using a mathematical algorithm where the new pass-
word is based on a challenge (e.g., a random number
chosen by the authentication server) and/or a counter.
B. Dynamic RC4-EA Encryption Method
Cryptography plays a major role to prevent eavesdropping
of sensitive information [17]. ElDahshan et. al. proposed a Figure 1. Structure of QR Code
dynamic RC4-EA method [18]. It is used for encrypting
and decrypting the plaintext. The advantage of the RC4-
EA method is to increase the security of the system,
by generating the secret keys dynamically. Where, the D. Multi-Channels base Authentication (MCA)
Evolutionary Algorithm (EA) is adapted to generate a
dynamic secret key as a seed used in the RC4 encryption Authentication is an important aspect of a secure systems,
algorithm. Hence, the final keystream can not be cracked where a user proves his identity by revealing his certain
by the attacker. Then, XOR operation is performed with secrets possesses [2]. Most authentication schemes have
this final keystream generated from the RC4-EA method on proposed using a single channel to authenticate users.
the plaintext to obtain the ciphertext and vis versa [18]. These schemes have undoubtedly improved security but
have not eliminated the possibility of some kinds of
attacks such as; man-in-the-middle/browser (MITM/B),
C. Data Hiding Using QR-Code real-time phishing/pharming (RTP/P) and malware.
It is essential that in order to hide the information, we need Therefore, researchers have come up with other schemes
a data container that may be used suitably according to the to overcome these drawbacks such as multi-channels
purpose. The data container may be an image, a video or a authentication(MCA) (i.e., web channel combined with
Quick Response Code (QR) code [7]. QR code is developed mobile network channel)[13].
by Japanese Denso Wave corporation in 1994 [10]. It is a
two dimensional array. The QR code can hold a considerably In theory, MCA offers superior security over single
greater volume of information: 7, 089 characters for numeric channel authentication schemes. That is, for an attacker to
only, 4, 296 characters for alphanumeric data and 2, 953 compromise user account, different independent channels
bytes of binary (8 bits) [19]. The QR code includes an have to be compromised first before gaining full access
encoding region and function patterns: the encoding region to the user account [13]. Also, MCA makes it impossible
is used to store the data, and the function patterns include for non-targeted attacks to successfully compromise user’s
position detection patterns, separators for position detection accounts; especially if the attacker is not geographically
patterns, timing patterns and alignment patterns [20]. close enough to the user to gain access to designated
To generate a QR code the string of bits are needed. This devices used by some channels.
string includes the characters of the original message, as

15 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 13, No. 6, June 2015

III. T HE P ROPOSED M ULTI -C HANNEL U SER B. Registration Phase


AUTHENTICATION P ROTOCOL In this phase, U registers with the S in order to use a
The major aim of the proposed protocol is to eliminate service. U and S execute the following steps:
the drawbacks of password guessing attack . The proposed 1) U chooses an identity UID , electronic mail Ue , mobile
protocol uses OTP encrypted by RC4-EA method, then hid- number UM , and password UP W . Then computes
ing cipher-OTP in QR code. Also, it integrates a web-based XU = h (UID ||UP W ). Then sends {UID , Ue , XU ,
applications and mobile devices for user authentication over T1 } to S via a secure channel.
multi-channels. The proposed protocol involves two parties
: a server (S) and a remote user (U ). Each authorized U U → S : {UID , Ue , UM , XU , T1 } (1)
can request service from S with the granted access rights. In
2) S examine the time stamp T1 . If it is invalid, then
addition, each U got an electronic mail and hold a mobile
rejects it. Otherwise, checks whether UID , Ue , UM
device. The protocol consists of four phases : initialization
is available for use. If it is, S computes YU =
phase, registration phase, login phase and authentication
h(XU ||UIP ). Finally, S stores the values UID , Ue ,
phase. The notations employed throughout this paper are
UM and YU in its database.
shown in table I.
S → DB : {UID , Ue , UM , YU } (2)
Table I
N OTATIONS C. Login Phase
Notation Description
The Login phase is shown in the following steps:
U Remote User 1) U enter his UID and UP W , and compute
UID User Identity 0 0

UP W User Password
XU = h(UID ||UP W ), then send UID , XU , T2
UIP User IP Address to S.
UW IP A White list of Allowed IP Addresses
UP rox User Using Proxy
UM User Mobile 0
Ue User Electronic Mail U → S : {UID , XU , T2 } (3)
S The Server
h(.) One-Way Hash Function
a Secret Key Used in RC4-EA Method
2) S examine the time stamp T2 . If it is invalid, then
0 0
(E/D)RC4−EA Encryption / Decryption Using rejects it. Otherwise, S computes YU = h(XU ||UIP ),
0
RC4-EA Method then checks whether UID is valid and YU == YU . If it
(E/D)QR (.) Function that Encodes/Decodes
Data into (QR) Code is, allowed user login. Otherwise, S ask U a maximum
|| Concatenation 3 attempts to provide his correct UID and UP W .
T Time Stamp
r1 ,r2 Random Nonce Generated by the Server If U exceed this threshold, then S consider U as an
Tc , Tend Time Created, Ended of Random Nonce attack and block his account.
D. Authentication Phase
A. Initialization Phase After U has a successful login. Now S wants to
authenticate U upon multi-channels by generating One-
In this phase, Internet Protocol Authentication (IPAuth)
Time QR (OTQR) and One-Time Password OTP. This
is a protocol suite for securing internet communications by
phase is divided into two processes:
authenticating each IP packet of a communication session.
IPAuth takes place between two parties of a server and a
user. The various steps of IPAuth will be explain below:
Authentication by Email channel process:
1) Assume that U request from S to join the system.
1) S generate a random nonce r1 , then computes KU =
2) The S will check UP rox :
ERC4−EA (r1 ), then computes MU = (E)QR (KU ).
If U access the system using proxy.
Finally, S stores MU , Tc , Tend , where MU is OTQR.
then S block the U connection.
S → DB : {MU , Tc , Tend } (4)
3) The S get UIP .
4) The S check the white list of IP addresses. 2) S sends MU , T3 to U via mail channel.
if (UIP == UW IP ). 3) U examine the time stamp T3 . If it is valid, U send
0 0
then U authentic and open connection MU , T3 to S.
0 0
else 4) S checks whether Tc  T3  Tend and MU == MU .
Reject connection and block U If it is, then user is authentic. Otherwise, not authentic
user.

16 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 13, No. 6, June 2015

Table II
Authentication by Mobil channel process: U SER L OGIN TABLE FOR O NE T IME PASSWORD
1) S generate a random nonce r2 , then computes FU =
U.N Password Email Mobil No.
h(r2 ). Finally, S stores FU , Tc , Tend , where FU is aqwers 895*/66! aqwers@egywow.com 96895635810
OTP. twerffr P**2334 twerffr@egywow.com 96890125612
yuhfrd Ad2*!98 yuhfrd@egywow.com 96695254523

S → DB : {FU , Tc , Tend } (5) Table III


L OGIN TABLE TO THE MAIN WEBSITE WITH OTQR VIA EMAIL
2) S sends r2 , T4 to U via mobile channel, then discards
r2 . U.N OTQR DC Status DU
3) U examine the time stamp T4 . If it is valid, U enter
0 0 0
r2 , then compute FU = h(r2 ) and send FU , T4 to S. aqwers
2015-05-24
1 (Valid)
Ready to
0 0 18:50:15 Use
4) S checks whether Tc  T4  Tend and FU == FU
is valid. If it is, then user authentic. Otherwise, not
authentic user. 2015-05-24 2015-05-24
aqwers 0 (Expired)
Now If OTQR and OTP holds, then server S is convinced 17:47:43 17:49:15
that User U is validated. Otherwise, the request is rejected.
IV. I MPLEMENTATION AND S ECURITY A NALYSES 2015-05-23
aqwers 2 (Expired) Not Used
18:31:38
Instead of using the traditional smart card for remote user
authentication. The proposed user authentication protocol
is adopting the RC4-EA encryption method to encrypt the Table IV
plain-OTP, then it is hiding the cipher-OTP in QR code. L OGIN TABLE TO THE MAIN WEBSITE WITH OTP VIA SMS
The users electronic mail and mobile device takes the
U.N OTP DC Status DU
responsibility for receiving the OTQR and the OTP as a 2015-05-24 Ready to
aqwers F21P40Ui 1 (Valid)
multi-channels to achieve mutual authentication between the 18:50:15 Use
2015-05-24 2015-05-24
U and S. aqwers nH8XxG62
17:47:43
0 (Expired)
17:51:15
The performance of the proposed authentication protocol aqwers B0Ej0PF6
2015-05-23
2 (Expired) Not Used
18:31:38
is tested using server 32 core AMD opteron processor 6376
with 32 GB of RAM and 4 RAID 1s, laptop (Intel i5, 1.80
GHz processor, 2 GB RAM) and simple mobile phone.
B. Security Analyses
The experiments have been implemented using PHP-MySql
language environment. The security of the proposed protocol is analyzed under
the possibilities of the types of attacks listed below:

A. Implementation 1) Prevent Replay Attack : In this type of attack,


The proposed user authentication protocol is very robust, the intruder gathers the communication messages
secure, reliable and very hard for illegitimate users to crack. exchanged between the U and S; then tries to replay
By implementing the OTQR/OTP techniques, it can help in the same messages acting as a legitimate user. In
mitigating a typical phishing attempt. Whenever user wishes the proposed authentication protocol, the random
to login the website, first step is that the U coming from nonce values r1 ,r2 , and a with time stamp T are
white list of Allowed IP Addresses UW IP . Second step generated for each session, and the parameters in all
is to enter UID and UP W for remote User authentication. the messages are all related to them. Those values
Once U is login and gets the OTQR/OTP by Email/SMS are verified by S as in equations 4,5 . The S checks
on his registered an electronic mail and a mobile number at what time interval T the request is received. If the
respectively. The server will store the OTQR/OTP and the time stamp are not within the time interval, the server
date created (DC). The OTQR/OTP with status value 1 is S will reject the intruder’s attempt to access the
valid which signifies that it can still be used by U . The service. Therefore, the proposed protocol is secure
moment U uses the generated OTQR/OTP. The OTQR/OTP against replay attack.
expires and its status value changes from 1 to 0 then the
register OTQR/OTP date used (DU). But, whenever U not 2) Prevent Man-in-the-middle Attack : In this type of
uses the OTQR/OTP after a period of 5 minutes it will attack, the malicious user listens to the communication
expire and its status value changes from 1 to 2 as shown in channel between S and U . In proposed authentication
tables II, III, IV. protocol, the intruder may intercept the web/mobile
communication messages, but he will never be able to

17 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 13, No. 6, June 2015

compute the OTQR and the OTP. Since, it is based on encrypted using the RC4-EA encryption method, then hiding
random nonce values, which is chosen fresh for each the cipher-OTP using the QR code technique. Therefore,
new session. Hence, the protocol is secure against the data can not be easily retrievable without adequate
man-in-the-middle attack. authorization. Also, the purpose of the paper is to integrate
a web based application with mobile-based applications to
3) Prevent Denial of service attack (DoS) : At DoS make it more secure than the general authentication methods.
attack, the attacker may flood a large number of The integration of web and mobile-based applications is a
illegal access request to S. The DoS attacks aim is multi-channel authentication scheme that is better than a
to consume S critical resources. By exhausting these single-channel authentication. Thus, the proposed authenti-
resources, the attacker can prevent S from serving cation protocol is more convenient, because the burden of
legitimate U . In the proposed authentication protocol, carrying a separate hardware token is removed. Moreover,
for every access request from any user U to S; S this protocol helps to overcome many challenging attacks
checks the UP rox and UIP as explain in III-A. Thus, such as replay attack, DoS attack, man-in-the-middle attack
the proposed protocol does not suffer from DoS and other malware attacks.
attacks.
R EFERENCES
4) Prevent Website Manipulation: One of Website [1] P.E.S.N. K. Prasasd, A.S.N. Chakravarthy, and B. D. C. N.
Manipulation attack is SQL Injection. SQL Injection Prasad, ”Performance Evaluation of Password Authentication
attack is a hacking technique which attempts to using Associative Neural Memory Models”, International
Journal of Advanced Information Technology (IJAIT), vol.
pass SQL commands through a web application; 2, no. 1, pp. 75-85, 2012.
to be executed by the back-end database. SQL
Injection is useless in the proposed authentication [2] A. Hiltgen, T. Kramp, T. Weigold, ”Secure Internet Banking
protocol, since the proposed protocol uses the Authentication”, IEEE Transactions on Security and Privacy,
”mysql real escape string()” command. Thus, the vol. 4, no. 2, pp. 21-29, 2006.
proposed protocol is secure against SQL Injection
[3] Sh. Kalra, S. Sood, ”Advanced remote user authentication
attacks. protocol for multi-server architecture based on ECC”, journal
of information secu rity and applications, vol. 18, pp. 98-
5) Prevent Phishing Attack Via the Web : Phishing 107, 2013.
is a form of online identity theft that aims to steal
sensitive information. In the proposed authentication [4] D. Chatterjee, J. Nath, S. Mondal, S. Dasgupta and Asoke
Nath, ”Advanced Symmetric key Cryptography using ex-
protocol, if the intruder knows UID and can get the tended MSA method: DJSSA symmetric key algorithm”,
UP W from the server by replacing the actual web Jounal of Computing, vol. 3, no. 2, pp. 66-71, 2011.
page with a similar one, it would be difficult to get the
OTQR and OTP because it send over multi-channel. [5] J. Malik, D. Girdhar, R. Dahiya, and G. Sainarayanan,
Which has to be chosen within a specified time stamp ”Multifactor Authentication Using a QR Code and a One-
Time Password”, J Inf Process Syst, vol.10, no.3, pp.483-
as in equations 4,5. 490, 2014.

6) Prevent KeyLoggers Attack : KeyLoggers are [6] M. V. Prakash, P. A. Infant, and S. J. Shobana,”Eliminating
applications or devices that monitor the physical Vulnerable Attacks Using One Time Password and PassText
keystrokes of user computer. Then they are gathering Analytical Study of Blended Schema”,Universal Journal of
Computer Science and Engineering Technology, vol. 1, no.
the information for later retrieval or send it to 2, pp. 133-140, 2010.
a spyware server. KeyLoggers is useless in the
proposed authentication protocol, since the proposed [7] RM. Muthaiah and N. Krishnamoorthy,”An Efficient Tech-
protocol uses the (Virtual Keyboard) which prevent nique for Data Hiding with use of QR Codes-Overcoming
the keylogger attacker to record the U sensitive data. the Pros and Cons of Cryptography and Steganography to
Keep the Hidden Data Secretive”, International Journal of
Thus, the proposed protocol is secure against the
Computer Applications, vol. 100 , no.14, 2014.
keylogger attack.
[8] A. Kumar, Km. Pooja, ”Steganography-A Data Hiding Tech-
nique”, International Journal of Computer Applications, vol.
V. C ONCLUSIONS 9, no.7, 2010.
The major contribution of this paper, is proposing a multi-
[9] A. A. Elngar, K. A. El Dahshan, E. K. Elsayed, and A.
channel user authentication protocol. The proposed protocol Aboshosha, ” Enhanced RC4 Encryption Method based on
enhances the security of a remote user login. The proposed Dynamic EA Key Generation, Al-Azhar University Engineer-
protocol adopted the one-time password (OTP) which is ing Journal, JAUES, vol. 9, no. 8, 2014

18 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 13, No. 6, June 2015

[10] D. Sonawane, M. Upadhye, P. Bhogade, and S. Bajpai, ”QR the CEO of ICGST LLC, Delaware, USA.
Based Advanced Authentication for all Hardware Platforms”,
International Journal of Scientific and Research Publications, Kamal Abdelraouf ElDahshan is a professor of Computer
vol. 4, no. 1, 2014.
Science and Information Systems at Al-Azhar University
[11] D. Pintor, ”QRP: An improved secure authentication method in Cairo, Egypt. An Egyptian national and graduate of
using QR codes”, Maestre Universitat Oberta de Catalunya, Cairo University, he obtained his doctoral degree from
Barcelona, Spain, 2012. the Universit de Technologie de Compigne in France,
where he also taught for several years. During his
[12] A. Aboshosha, Kamal A. El Dahshan, Eman K. Elsayed, and
Ahmed A. Elngar, ”An Intelligent Secure Authentication Pro- extended stay in France, he also worked at the prestigious
tocol for CMS Applications, Al-Azhar UniversityWorkshops Institute National de Tlcommunications in Paris. Professor
Advances in Computer Research Work(ACR-2015), 2015. ElDahshan’s extensive international research, teaching,
and consulting experiences have spanned four continents
[13] M. Al Fairuz and K. Renaud. ”Multi-channel, multi-level
and include academic institutions as well as government
authentication for more secure ebanking”. In ISSA, 2010.
and private organizations. He taught at Virginia Tech
[14] E.Kalaikavitha, and J. gnanaselvi, ”Secure Login Using En- as a visiting professor; he was a Consultant to the
crypted One Time Password (Otp) and Mobile Based Login Egyptian Cabinet Information and Decision Support Center
Methodology”, Research Inventy: International Journal Of (IDSC); and he was a senior advisor to the Ministry of
Engineering And Science, vol.2, no. 10, pp. 14-17, 2013.
Education and Deputy Director of the National Technology
[15] S. Hamdare, V. Nagpurkar, and J. Mittal, ”Securing SMS Development Center. Prof. ElDahshan has taught graduate
Based One Time Password Technique from Man in the and undergraduate courses in information resources and
Middle Attack”, International Journal of Engineering Trends centers, information systems, systems analysis and design,
and Technology (IJETT), vol. 11, no. 3, 2014. and expert systems. Professor ElDahshan is a professional
[16] A. A. Khan, M. S. Market, ”Preventing Phishing Attacks
Fellow on Open Educational Resources as recognized by the
using One Time Password and User Machine Identification”, United States Department of State. Prof. Eldahshan wants
International Journal of Computer Applications, vol. 68, no.3, to work in collaboration with the Ministry of Education
2013. to develop educational material for K-12 levels. Prof.
Eldahshan is interested in training instructors to be able to
[17] S. Gupta ,A. Chattopadhyay ,K. Sinha ,S. Maitra , and B.
Sinha, ”High-performance hardware implementation for RC4
use OER in their teaching and hopes to make his university
stream cipher”, IEEE Trans Comput, vol. 62, no. 4 , pp. 730 a center of excellence in OER and offer services to other
- 743, 2013. universities in the country.

[18] A. Aboshosha, K. A. ElDahshan, E. K. Elsayed, and A. A. Eman K. Elsayed Bachelor of Science from computer
Elngar, ”EA Based Dynamic Key Generation in RC4 Ci-
phering Applied to CMS”, International Journal of Network
science Department, Cairo University 1994, Master of
Security, vol.17, no.4, pp. 405-412, 2015. computer science from Cairo university 1999, and computer
science PHD 2005 from Alazhar university. I Published
[19] A. Gaikwad, K.R.Singh, ”Information Hiding using Image eleven papers until 2010 in data mining, ontology and
Embedding in QR Codes for Color Images: A Review”, e-learning. I am a member in egyptian mathematical society
International Journal of Computer Science and Information
Technologies, vol. 6, no. 1, pp. 278-283, 2015. and intelligent computer and information systems society.

[20] R. Divya, S. Muthukumarasamy, ”Visual Authentication Us- Ahmed A. Elngar graduated with a B.Sc. in computer
ing QR Code to Prevent Keylogging”, International Journal Science from computer science Department, Al-Azhar
of Engineering Trends and Technology, vol. 20, no. 3, 2015. University 2004, Master of computer science in Intrusion
[21] A. Hole , M. Jadhav , Sh. Kad , and S. Shinde, ”Encryption Detection System (IDS) from Ain Shanm university 2012.
and Decryption of Data Using QR Authentication System”, Now he is a P.hD student at computer science Department,
International Journal of Computer Science and Mobile Com- Al-Azhar University. Also he is a member in Egyptian
puting, vol. 3, no. 4, pp. 488-496, 2014. Mathematical Society (EMS) and International Rough Set
Ashraf Aboshosha graduated with a B.Sc. in industrial Society(IRSS).
electronics from Menoufia University, Egypt at 1990.
At 1997 he received his M.Sc. in automatic control and
measurement engineering. From 1997 to 1998 he was guest
researcher at research centre Jlich (FZJ), Germany. From
2000 to 2004 he was a doctoral student (DAAD-scholarship)
at Eberhard-Karls-University, Tbingen, Germany. Where he
received his Doctoral degree (Dr. rer. nat.) at 2004. He is

19 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
View publication stats

You might also like