HMAC based one t #x0131;me password generator
Title | HMAC based one t #x0131;me password generator |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Yakut, S., Ozer, A.B. |
Conference Name | Signal Processing and Communications Applications Conference (SIU), 2014 22nd |
Date Published | April |
Keywords | authentication, Conferences, cryptography, electronic media, fixed length strings, hash algorithm, Hash Function, Hash functions, Hash-Based Message Authentication Code, hashing-based message authentication code structure, HMAC, Keccak, Keccak digest algorithm, message authentication, one time password production methods, One Time Passwords, one tıme password generator, Production, Signal processing, Signal processing algorithms, Standards |
Abstract | One Time Password which is fixed length strings to perform authentication in electronic media is used as a one-time. In this paper, One Time Password production methods which based on hash functions were investigated. Keccak digest algorithm was used for the production of One Time Password. This algorithm has been selected as the latest standards for hash algorithm in October 2012 by National Instute of Standards and Technology. This algorithm is preferred because it is faster and safer than the others. One Time Password production methods based on hash functions is called Hashing-Based Message Authentication Code structure. In these structures, the key value is using with the hash function to generate the Hashing-Based Message Authentication Code value. Produced One Time Password value is based on the This value. In this application, the length of the value One Time Password was the eight characters to be useful in practice. |
DOI | 10.1109/SIU.2014.6830541 |
Citation Key | 6830541 |
- HMAC
- standards
- Signal processing algorithms
- signal processing
- Production
- One Time Passwords
- one time password production methods
- one tıme password generator
- message authentication
- Keccak digest algorithm
- Keccak
- authentication
- hashing-based message authentication code structure
- Hash-Based Message Authentication Code
- Hash functions
- Hash Function
- hash algorithm
- fixed length strings
- electronic media
- Cryptography
- Conferences