Hoornaert et al., 2005 - Google Patents
Network Working Group D. M'Raihi Request for Comments: 4226 VeriSign Category: Informational M. Bellare UCSDHoornaert et al., 2005
View PDF- Document ID
- 7268093009230083585
- Author
- Hoornaert F
- Naccache D
- Ranen O
- Publication year
External Links
Snippet
This document describes an algorithm to generate one-time password values, based on Hashed Message Authentication Code (HMAC). A security analysis of the algorithm is presented, and important parameters related to the secure deployment of the algorithm are …
- 238000004458 analytical method 0 abstract description 16
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
Similar Documents
Publication | Publication Date | Title |
---|---|---|
M'Raihi et al. | Hotp: An hmac-based one-time password algorithm | |
EP1828946B1 (en) | One time password | |
US6892301B1 (en) | Method and system for securely handling information between two information processing devices | |
EP1751913B1 (en) | Signature generation and verification method using time lock puzzle | |
M'Raihi et al. | RFC 4226: HOTP: An HMAC-based one-time password algorithm | |
EP1022638A2 (en) | Method and system for securely handling information between two information processing devices | |
CN116881865A (en) | A license generation method and system | |
Ramtri et al. | Secure banking transactions using RSA and two fish algorithms | |
Mitchell | Remote user authentication using public information | |
Hoornaert et al. | Network Working Group D. M’Raihi Request for Comments: 4226 VeriSign Category: Informational M. Bellare UCSD | |
Bhatia | Cryptography-The Hidden Message | |
Kara et al. | An encrypted and signed plaintext symmetric cryptosystem | |
Rabah | Secure implementation of message digest, authentication and digital signature | |
Korobeinikova | SEARCHING FOR SOLUTIONS FOR SERVER IMPLEMENTATION OF DIGITAL SIGNATURE IN AN AUTOMATED DOCUMENT MANAGEMENT SYSTEM. | |
Shi et al. | Research on System Data Security Based on State Secret Algorithm | |
Glushachenko | Public key cryptosystems and their application in digital signature algorithms | |
Gutmann | Encryption and Security Tutorial | |
Lo | A framework for cryptography algorithms on mobile devices | |
BSAFE | Crypto-J | |
Bıçakcı | On the efficiency of authentication protocols, digital signatures and their applications in e-health: a top-down approach | |
Grasso et al. | Definition of terms used by the Auto-ID Labs in the anti-counterfeiting white paper series | |
Blomqvist | Kleptography--Overview and a new proof of concept | |
CN120513601A (en) | Method and apparatus for enabling user equipment to utilize secrets | |
Antheunisse et al. | Cryptography with Backdoors | |
Ho | Hybrid cryptosystem using symmetric algorithms and public-key algorithms |