An Effective One - Time Password Algorithm Using Time


The KIPS Transactions:PartC, Vol. 8, No. 4, pp. 373-378, Aug. 2001
10.3745/KIPSTC.2001.8.4.373,   PDF Download:

Abstract

Almost all network systems provide an authentication mechanism based on user ID and password. In such system, it is easy to obtain the user password using a sniffer program with illegal eavesdropping. The one-time password and challenge-response method are useful authentication schemes that protect the user passwords against eavesdropping. In client/server environments, the one-time password scheme using time is especially useful because it solves the synchronization problem. However, it has a problem with associated time-slippage, a problem that causes the systems authentication to fail. In this paper, we propose an effective one-time password algorithm, which solves the time-slippage problem through the use of 1-bit information, which denotes duration in which authentication may be failed because of time-slippage. This algorithm is easily and quickly added to current one-time password systems that use time without requiring any change of protocols.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
J. G. Park, T. J. Chang, B. J. Park, J. C. Ryou, "An Effective One - Time Password Algorithm Using Time," The KIPS Transactions:PartC, vol. 8, no. 4, pp. 373-378, 2001. DOI: 10.3745/KIPSTC.2001.8.4.373.

[ACM Style]
Joong Gil Park, Tae Joo Chang, Bong Joo Park, and Jae Cheol Ryou. 2001. An Effective One - Time Password Algorithm Using Time. The KIPS Transactions:PartC, 8, 4, (2001), 373-378. DOI: 10.3745/KIPSTC.2001.8.4.373.