The improved one-time password algorithm using time

被引:0
作者
Park, J
Park, B
Park, J
Ryou, JC
机构
[1] Natl Secur Res Inst, Yusong Gu, Taejon 305350, South Korea
[2] Ho Seo Univ, Dept Comp Sci, Chungnam 336795, South Korea
[3] Kwang Ju Inst Sci & Technol, Dept Informat & Commun, Puk Gu, Gwangju 500712, South Korea
[4] Chungnam Natl Univ, Dept Comp Sci, Taejon 305764, South Korea
关键词
authentication; one-time password; time-slippage;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most network systems provide an authentication mechanism based on a user identification number and a password. In such systems, it is easy to obtain a user's password using a sniffer program with illegal eavesdropping. The one-time password method and the challenge-response method are useful authentication schemes that protect a user's password against eavesdropping. In client/server environments, the one-time password scheme using time is especially useful because it solves the synchronization problem. However, it has a problem of time-slippage, and this problem causes the authentication to be failed. In this paper, we propose an effective one-time password algorithm, which solves the time-slippage problem through the use of I-bit information, which denotes the duration in which the authentication could be failed because of time-slippage. This algorithm can be added easily and quickly to current one-time password systems using time without requiring any change of protocols.
引用
收藏
页码:1962 / 1966
页数:5
相关论文
共 9 条
[1]  
FORD W, 1994, COMPUT COMMUN, P109
[2]  
Haller N. M., 1994, Proceedings Internet Society Symposium on Network and Distributed System Security 1994, P151
[3]  
PARK J, 2000, 12 WORKSH INF SEC CR, P503
[4]   Transcription factors regulating pituitary development [J].
Parks, JS ;
Brown, MR .
GROWTH HORMONE & IGF RESEARCH, 1999, 9 :2-8
[5]  
Sandirigama M, 2000, IEICE T COMMUN, VE83B, P1363
[6]  
Schneier Bruce, 1996, APPL CRYPTOGRAPHY
[7]  
Shimizu A, 1998, IEICE T COMMUN, VE81B, P1666
[8]  
Stallings W., 1995, Network and Internetwork Security Principles and Practice
[9]  
RSA SECUID AUTHENTIC