1996
DOI: 10.17487/rfc1938
|View full text |Cite
|
Sign up to set email alerts
|

A One-Time Password System

Abstract: A One-Time Password System Status of this MemoThis document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. ABSTRACTThis document describes a one-time password authentication system (OTP). The system provides authentication for system access… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
70
0
1

Year Published

1999
1999
2022
2022

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 147 publications
(71 citation statements)
references
References 5 publications
0
70
0
1
Order By: Relevance
“…Our MRP shares some similarities with protocols based on hash chains (e.g., TESLA [HPJ02], OTP (S/Key) [HMNS98], Lamport authentication [Lam81]). These protocols can adapt to different data structures such as hash trees (see for example, Merkle signatures [Mer89] and Merkle tree traversal [Szy04]) and can be turned into dynamic ones (consult Naor and Yung [NY89]).…”
Section: Discussionmentioning
confidence: 98%
“…Our MRP shares some similarities with protocols based on hash chains (e.g., TESLA [HPJ02], OTP (S/Key) [HMNS98], Lamport authentication [Lam81]). These protocols can adapt to different data structures such as hash trees (see for example, Merkle signatures [Mer89] and Merkle tree traversal [Szy04]) and can be turned into dynamic ones (consult Naor and Yung [NY89]).…”
Section: Discussionmentioning
confidence: 98%
“…Observe that c works as parameter for the choice of the seed to be used. Concerning the hash function H, we observe that the approaches followed in previous schemes [14,15,23,25] use cryptographic hash functions which satisfy the collision-resistant property, that is, it should be hard for an attacker to find a message such that its hash value equals a given value. In our scheme, this requirement is not necessary.…”
Section: The Dccn Generation Schemementioning
confidence: 99%
“…Haller et al [20] implemented the aforementioned scheme as S/KEY authentication. The implementation relies on 64-bit numbers, but these are mapped to words of varying length to reduce the burden on the user.…”
Section: Introductionmentioning
confidence: 99%