Authentication Protocols Based on One-Time Passwords

被引:0
|
作者
Babkin, Sergey [1 ]
Epishkina, Anna [1 ]
机构
[1] Natl Res Nucl Univ MEPhI, Cryptol & Cybersecur Dept, Moscow, Russia
关键词
authentication; two-factor authentication; one-time password; protocol; vulnerability; information security;
D O I
10.1109/eiconrus.2019.8656839
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Nowadays one-time passwords are used in a lot of areas of information technologies including e-commerce. A few vulnerabilities in authentication protocols based on one-time passwords are widely known. In current work, we analyze authentication protocols based on one-time passwords and their vulnerabilities. Both simple and complicated protocols which are implementing cryptographic algorithms are reviewed. For example, an analysis of relatively old Lamport's hash-chain protocol is provided. At the same time, we examine HOTP and TOTP protocols which are actively used nowadays. The main result of the work are conclusions about the security of reviewed protocols based on one-time passwords.
引用
收藏
页码:1794 / 1798
页数:5
相关论文
共 50 条
  • [41] A Cloud Authentication Protocol using One-Time Pad
    Sim, Lexus Jun Hong
    Ren, Shu Qin
    Keoh, Sye Loong
    Aung, Khin Mi Mi
    [J]. PROCEEDINGS OF THE 2016 IEEE REGION 10 CONFERENCE (TENCON), 2016, : 2513 - 2516
  • [42] AUTHENTICATION ENCRYPTION CRYPTOSYSTEM WITH DERIVED ONE-TIME KEYS
    Zubov, A. Yu
    [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2020, (50): : 51 - 61
  • [43] Tree Parity Machine-based One-Time Password Authentication Schemes
    Chen, Tieming
    Huang, Samuel H.
    [J]. 2008 IEEE INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-8, 2008, : 257 - 261
  • [44] One-time password authentication based on double random soft input model
    Chen, Jing
    Sun, Lin-Fu
    [J]. Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2010, 42 (02): : 154 - 159
  • [45] Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location
    Yang, Zheng
    Jin, Chenglu
    Ning, Jianting
    Li, Zengpeng
    Tien Tuan Anh Dinh
    Zhou, Jianying
    [J]. 37TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2021, 2021, : 497 - 512
  • [46] Passblot: A Usable Way of Authentication Scheme to Generate One Time Passwords
    Gupta, Sainath
    Sabbu, Pruthvi
    Varma, Siddhartha
    Gangashetty, Suryakanth V.
    [J]. ADVANCES IN NETWORK SECURITY AND APPLICATIONS, 2011, 196 : 374 - 382
  • [47] A Continuous Authentication Technique for XR Utilizing Time-Based One Time Passwords, Haptics, and Kinetic Activity
    Grandi, Jeronimo G.
    Terrell, Jerry
    Lofca, Kadir
    Ruizvalencia, Carlos
    Kopper, Regis
    [J]. 2023 IEEE CONFERENCE ON VIRTUAL REALITY AND 3D USER INTERFACES ABSTRACTS AND WORKSHOPS, VRW, 2023, : 959 - 960
  • [48] An impersonation attack on one-time password authentication protocol OSPA
    Tsuji, T
    Shimizu, A
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2003, E86B (07) : 2182 - 2185
  • [49] Multifactor Authentication Using a QR Code and a One-Time Password
    Malik, Jyoti
    Girdhar, Dhiraj
    Dahiya, Ratna
    Sainarayanan, G.
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2014, 10 (03): : 483 - 490
  • [50] An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees
    Yang, Huihui
    Oleshchuk, Vladimir A.
    [J]. SECURE IT SYSTEMS, NORDSEC 2015, 2015, 9417 : 123 - 135