HMAC BASED ONE TIME PASSWORD GENERATOR

被引:0
作者
Yakut, Selman [1 ]
Ozer, A. Bedri [1 ]
机构
[1] Firat Univ, Bilgisayar Muhendisligi Bolumu, Elazig, Turkey
来源
2014 22ND SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU) | 2014年
关键词
Hash Function; Keccak; One Time Passwords; Hash-Based Message Authentication Code;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
One Time Password which is fixed length strings to perform authentication in electronic media is used as a one-time. In this paper, One Time Password production methods which based on hash functions were investigated. Keccak digest algorithm was used for the production of One Time Password. This algorithm has been selected as the latest standards for hash algorithm in October 2012 by National Instute of Standards and Technology. This algorithm is preferred because it is faster and safer than the others. One Time Password production methods based on hash Auctions is called Hashing-Based Message Authentication Code structure. In these structures, the key value is using with the hash Junction to generate the Hashing-Based Message Authentication Code value. Produced One Time Password value is based on the This value. In this application, the length of the value One Time Password was the eight characters to be useful in practice.
引用
收藏
页码:1563 / 1566
页数:4
相关论文
共 10 条
[1]  
Bellare M., 2005, NETWORK WORKING GROU, V4226
[2]  
Daemen J., 2008, EUROCRYPT
[3]  
Daemen J., 2013, KECCAK SPONGE FUNCTI
[4]  
Daemen J., 2007, ECR HASH WORKSH
[5]   PASSWORD AUTHENTICATION WITH INSECURE COMMUNICATION [J].
LAMPORT, L .
COMMUNICATIONS OF THE ACM, 1981, 24 (11) :770-772
[6]  
Li X, 2010, NETW COMP ADV INF MA, p172
[7]   A Unidirectional One-Time Password Authentication Scheme without Counter Desynchronization [J].
Liao, Shuren ;
Zhang, Qiuyan ;
Chen, Chao ;
Dai, Yiqi .
2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, :361-364
[8]  
Paar Christof, 2010, UNDERSTANDING CRIPTO, P293, DOI 10.1007/978-3-642-04101-3_11
[9]  
Stallings W., 2017, Cryptography and Network Security: Principles and Practice
[10]  
Wang XY, 2005, LECT NOTES COMPUT SC, V3621, P17