Visible to the public Implement Time Based One Time Password and Secure Hash Algorithm 1 for Security of Website Login Authentication

TitleImplement Time Based One Time Password and Secure Hash Algorithm 1 for Security of Website Login Authentication
Publication TypeConference Paper
Year of Publication2019
AuthorsSeta, Henki, Wati, Theresia, Kusuma, Ilham Cahya
Conference Name2019 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)
Keywordsaccount number, authentication, authentication process, authorisation, compositionality, cryptography, factor authentication method, hash algorithms, information system access, Information systems, message authentication, process user authentication, pubcrawl, Resiliency, Secure Hash Algorithm 1, Secure Hash Algorithm 1 generate code, SHA1, time 30.0 s, Time Based One Time Password, time limit, time-based one time password, two-factor authentication, user access rights, user passwords, username, Web sites, website, Website login authentication, word length 160.0 bit
AbstractThe use of information systems is a solutions to support the operations of the institution. In order to access information systems in accordance with their access rights, usually the user will enter a username and password as the authentication process. However, this has a weakness if the other side is cheating by sniffing or tapping user passwords. This makes the password unsafe to use for access information systems. If the username and password if it is stolen, abuse will occur for the crime or theft of the owner's identity accounts like name, email, telephone number, biological mother's name, account number and others. One solution is to apply two factor authentication method which is Time-Based One Time Password (TOTP) and Secure Algorithm Hash Algorithm 1 (SHA1). With this method, the system Authentication of a website or site does not only depend on the username and password to enter the account user but the user will get a token or code which is used to log in to the user's account. After testing hundred times, the authentication process who use Two Factor Authentication can tackle possible attacks on abuse o user access rights. Time Based Application One Time Password and Secure Hash Algorithm 1 Generate code that can't be the same because of the code it can only be used once with a time limit certain so it is difficult to guess. SHA1 with long input different strings will produce output with a fixed length string of 160 bits. Test results are obtained the results that 30 seconds is enough to prevent hackers log in and take over the account without permission and also prove that two-factor authentication can increase the security of the authentication process well. The time above is the result of testing the process user authentication until the hacker sniffing against tokens to try to take over the account.
DOI10.1109/ICIMCIS48181.2019.8985196
Citation Keyseta_implement_2019