StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

One Time Passwords - Research Paper Example

Cite this document
Summary
Originally based on S/KEY, a seminal OTP system developed at Bellcore, OTP (One-time password) technology is a system that requires a new password every time a user authenticates. This basic principle of an OTP solution effectively protects the system against replay attacks, or…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.4% of users find it useful
One Time Passwords
Read Text Preview

Extract of sample "One Time Passwords"

Download file to see previous pages

The new passwords are generated by the system using a one-way hash function (Bhaiji, 2009). Challenge/response: This type also uses mathematical algorithm, but with a challenge function. In this type, the user needs to generate a one-time password by entering a challenge (a random number or secret key), received at the time of login, into the password-generating token/software. Since new passwords are based on a challenge mechanism instead of being based on previous password, this type offers more security as compared to mathematical algorithm type (Bhaiji, 2009).

Time-synchronized: In this type, passwords are generated by the system using a physical hardware token that has an accurate clock synchronized with the clock on the authentication server (Bhaiji, 2009). OTP technology is a type of multifactor (two-factor) authentication access control which provides strong user authentication for secure access. Two-factor authentication refers to the combination of any two of the three basic forms of one-factor authentication mechanism: something the user knows such as a password, pass phrase or PIN (personal identification number), something the user possesses such as a smart card or access token (hardware or software), and something physically unique about the user such as a fingerprint, voice, retina or iris scan, or DNA sequence (Samuelle, 2008).

If the intruder is able to guess a randomly generated OTP somehow, he will be able to access the system only once because subsequent access would require him to get lucky again guessing a randomly generated OTP. The major problem of OTPs is that no user can ever able to remember them because they are generated in bulk and stored in a file on a system. Therefore, OTPs are vulnerable to eavesdropping because if someone knows that the passwords are stored in the file, and then he can gain unauthorized access to the user’s account where he can then install keystroke-capturing

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“One Time Passwords Research Paper Example | Topics and Well Written Essays - 1250 words”, n.d.)
One Time Passwords Research Paper Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/miscellaneous/1567659-one-time-passwords
(One Time Passwords Research Paper Example | Topics and Well Written Essays - 1250 Words)
One Time Passwords Research Paper Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/miscellaneous/1567659-one-time-passwords.
“One Time Passwords Research Paper Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/miscellaneous/1567659-one-time-passwords.
  • Cited: 0 times

CHECK THESE SAMPLES OF One Time Passwords

Impact of E-Commerce in the Banking Sector

Impact of e-Commerce in the Banking Sector The modern era has witnessed the widespread espousal of information technology in many business sectors.... Many business establishments usually use information technology in processes such as managing organisational data.... hellip; In such cases, information technology has to do with the operation of computers, as well as the use of computer software for processes such as converting data, protection, storage, and the retrieval of information....
14 Pages (3500 words) Essay

E-commerce security and fraud protection

First, user IDs, passwords, biometrics and tokens have been used to authenticate an individual.... Thus, user IDs and passwords could be combined with physical tokens, creating a multiple factor authentication so as to... This paper outlines some of the current security measures that have been adopted to safeguard consumers....
7 Pages (1750 words) Term Paper

Network and Internet Security

They can be of the following type: a shared secret; authenticated public keys; a single public key; One Time Passwords.... This technique ensures that there is only one key which will be used – that is a secret key.... Asymmetric encryption (Public key encryption) - requires the use of a two keys where one is a private key and the other is a public key which is known to a number of people....
6 Pages (1500 words) Essay

Network Security

This essay "Company Security" is about security is vital for the management, users, as well as technical personnel that makes use of the network.... nbsp;The needs of users of the data provided via a network and subsequently develop a security policy and plan that addresses the security issues concerned....
8 Pages (2000 words) Essay

INFA questions

Defense Computer Security Computer Security Data confidentiality Short timeliness- One Time Passwords Long timeliness – user details like email, home address, telephone 2.... Please restrict your answer for each question to one (1/2) page (double spaced).... As much as lower EALs cost less, they however do not provide increased assurance....
2 Pages (500 words) Assignment

Network Security - Information Assurance

The paper "Network Security - Information Assurance" highlights that in general, the explosive growth of Information Technology and the amalgamation of IT with telecommunication have brought together the world much closer than any time before in history.... Finally, Knowledge, which is a collection of accepted facts, principles and rules of thumb in specific domains, is developed over a period of time from the result of inferences and implications produced from information (Raggad (pp....
12 Pages (3000 words) Coursework

Copyright Systech Information Technology Ltd

This assignment "Copyright Systech Information Technology Ltd" outlines a total of 8 policies that have been considered most important by the Computer Security Program Manager of SYSTECH.... nbsp; Security today is the mechanism that is essential for the success of any computer firm....
14 Pages (3500 words) Assignment

The Management of Information Systems with Regards to Securing Such Systems

To mitigate the problem resulting from poor use of passwords, the preceding discussion suggests that the organization should improve access management.... "The Management of Information Systems with Regards to Securing such Systems" paper looks at the main modalities that hackers use to gain unauthorized access to information systems....
9 Pages (2250 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us