Research and Design on an Improved TOTP Authentication

Article Preview

Abstract:

HOTP generation algorithm has safety risks because the counter is easily predicted. This paper describes TOTP generation algorithm which make the counter replace with timer, and makes an improved authentication method according to Three-Protocol of HOTP authentication method based on TOTP. The improved authentication method use an authentication number threshold and a timestamp to resist brute force attacks and replay attacks, use a random number and the MD5 encryption resist Man-in-the-Middle attack. Finally, a safe and useful Web authentication system is designed by PHP language.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

595-599

Citation:

Online since:

September 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] D. M'Raihi,M. Bellare,F. Hoornaert, et al. HOTP: An HMAC-Based One-Time Password Algorithm[EB/OL]. http: /www. apps. ietf. org/rfc/rfc4226. html. 2005-11.

DOI: 10.17487/rfc4226

Google Scholar

[2] D. M'Raihi,S. Machani,M. Pei, et al. TOTP: Time-based One-time Password Algorithm [EB/OL]. http: /tools. ietf. org/html/rfc6238. 2011-8.

DOI: 10.17487/rfc6238

Google Scholar

[3] H. Krawczyk,M. Bellare,R. Canetti. HMAC: Keyed-Hashing for Message Authentication[EB/OL]. http: /www. ietf. org/rfc/rfc2104. txt. 1997-2.

DOI: 10.17487/rfc2104

Google Scholar

[4] N. Popp,D. M'raihi,L. Hart. One time password [P]. USA:20090313687, 2009-12-17.

Google Scholar

[5] David G.W. Birch. Digital identity management[M]. London: Gower Publishing, Ltd. 2007-5: 113-118.

Google Scholar

[6] Yanzhen. The Research of Interaction Design Patterns and Design Methods on Rich Internet Application User Interface[D]. DongHua University, (2011).

Google Scholar