One-Time Password System with Infinite Nested Hash Chains

Hash chains have been used as OTP generators. Lamport hashes have an intensive computation cost and a chain length restriction. A solution for signature chains addressed this by involving public key techniques, which increased the average computation cost. Although a later idea reduced the user comp...

Full description

Saved in:
Bibliographic Details
Published inSecurity Technology, Disaster Recovery and Business Continuity Vol. 122; pp. 161 - 170
Main Authors Eldefrawy, Mohamed Hamdy, Khan, Muhammad Khurram, Alghathbar, Khaled
Format Book Chapter
LanguageEnglish
Published Germany Springer Berlin / Heidelberg 2010
Springer Berlin Heidelberg
SeriesCommunications in Computer and Information Science
Subjects
Online AccessGet full text
ISBN3642176097
9783642176098
ISSN1865-0929
1865-0937
DOI10.1007/978-3-642-17610-4_18

Cover

Abstract Hash chains have been used as OTP generators. Lamport hashes have an intensive computation cost and a chain length restriction. A solution for signature chains addressed this by involving public key techniques, which increased the average computation cost. Although a later idea reduced the user computation by sharing it with the host, it couldn’t overcome the length limitation. The scheme proposed by Chefranov to eliminate the length restriction had a deficiency in the communication cost overhead. We here present an algorithm that overcomes all of these shortcomings by involving two different nested hash chains: one dedicated to seed updating and the other used for OTP production. Our algorithm provides forward and non-restricted OTP generation. We propose a random challenge–response operation mode. We analyze our proposal from the viewpoint of security and performance compared with the other algorithms.
AbstractList Hash chains have been used as OTP generators. Lamport hashes have an intensive computation cost and a chain length restriction. A solution for signature chains addressed this by involving public key techniques, which increased the average computation cost. Although a later idea reduced the user computation by sharing it with the host, it couldn’t overcome the length limitation. The scheme proposed by Chefranov to eliminate the length restriction had a deficiency in the communication cost overhead. We here present an algorithm that overcomes all of these shortcomings by involving two different nested hash chains: one dedicated to seed updating and the other used for OTP production. Our algorithm provides forward and non-restricted OTP generation. We propose a random challenge–response operation mode. We analyze our proposal from the viewpoint of security and performance compared with the other algorithms.
Author Eldefrawy, Mohamed Hamdy
Khan, Muhammad Khurram
Alghathbar, Khaled
Author_xml – sequence: 1
  givenname: Mohamed Hamdy
  surname: Eldefrawy
  fullname: Eldefrawy, Mohamed Hamdy
  email: meldefrawy@ksu.edu.sa
  organization: Center of Excellence in Information Assurance (CoEIA), King Saud University, Saudi Arabia
– sequence: 2
  givenname: Muhammad Khurram
  surname: Khan
  fullname: Khan, Muhammad Khurram
  email: mkhurram@ksu.edu.sa
  organization: Center of Excellence in Information Assurance (CoEIA), King Saud University, Saudi Arabia
– sequence: 3
  givenname: Khaled
  surname: Alghathbar
  fullname: Alghathbar, Khaled
  email: kalghathbar@ksu.edu.sa
  organization: Information Systems Department, College of Computer and Information Sciences, King Saud University, Saudi Arabia
BookMark eNo9kMtOwzAQRQ0URFv6ByzyAwaP7fixRBXQShVFoqwtJ3ZJoHVCHFTx97gP4c1I9-qMPGeEBqEJHqFbIHdAiLzXUmGGBacYpACCuQF1hiYpZik8ZPwcDUGJHBPN5AUanQqi5eC_oPoKDUXqpVZKX6NJjJ8kPc6FFHKI9DJ4vKq3Pnu1Me6azmVvv7H322xX91U2D-s61L3PXnwKXTazscqmla1DvEGXa7uJfnKaY_T-9LiazvBi-TyfPixwC7lS2PmclQ6KwjuiqHa2pA6slKWyOi-VEI5RDtTREqwlkim9LnLPFVGyoAwsGyN63Bvbrg4fvjNF03xFA8TsRZlkxDCTTjcHKWYvKkH8CLVd8_2T_m78nip96Du7KSvb9r6LhhEhQIIBLRMN7A8QKGd7
ContentType Book Chapter
Copyright Springer-Verlag Berlin Heidelberg 2010
Copyright_xml – notice: Springer-Verlag Berlin Heidelberg 2010
DBID FFUUA
DOI 10.1007/978-3-642-17610-4_18
DatabaseName ProQuest Ebook Central - Book Chapters - Demo use only
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISBN 9783642176104
3642176100
EISSN 1865-0937
Editor Fang, Wai-Chi
Kang, Heau-jo
Arnett, Kirk P
Khurram Khan, Muhammad
Ślęzak, Dominik
Editor_xml – sequence: 1
  fullname: Fang, Wai-Chi
– sequence: 2
  fullname: Ślęzak, Dominik
– sequence: 3
  fullname: Kang, Heau-jo
– sequence: 4
  fullname: Arnett, Kirk P
– sequence: 5
  fullname: Khurram Khan, Muhammad
EndPage 170
ExternalDocumentID EBC3066171_197_171
GroupedDBID -T.
089
0D6
0DA
20A
38.
4UP
4V3
9-X
A4J
AABBV
ABBVZ
ABMKK
ABMNI
ACDPG
ACZTO
ADVHH
AEJLV
AEKFX
AEOKE
AETDV
AEZAY
AHSMR
ALMA_UNASSIGNED_HOLDINGS
AZZ
BBABE
CZZ
FFUUA
I4C
IEZ
JJU
MA.
MYL
SBO
SNUHX
TBMHI
TPJZQ
Z5O
Z7R
Z7S
Z7U
Z7V
Z7W
Z7X
Z7Y
Z7Z
Z81
Z83
Z84
Z85
Z87
Z88
29F
RSU
ID FETCH-LOGICAL-p1588-de53cd1bbed0829dac2d1a77c8a95c866d32412d2c1aa07389fb5e48087b231a3
ISBN 3642176097
9783642176098
ISSN 1865-0929
IngestDate Tue Jul 29 19:59:24 EDT 2025
Wed May 28 23:38:58 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCallNum QA75.5-76.95
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-p1588-de53cd1bbed0829dac2d1a77c8a95c866d32412d2c1aa07389fb5e48087b231a3
OCLC 693779889
PQID EBC3066171_197_171
PageCount 10
ParticipantIDs springer_books_10_1007_978_3_642_17610_4_18
proquest_ebookcentralchapters_3066171_197_171
PublicationCentury 2000
PublicationDate 2010
PublicationDateYYYYMMDD 2010-01-01
PublicationDate_xml – year: 2010
  text: 2010
PublicationDecade 2010
PublicationPlace Germany
PublicationPlace_xml – name: Germany
– name: Berlin, Heidelberg
PublicationSeriesTitle Communications in Computer and Information Science
PublicationSubtitle International Conferences, SecTech and DRBC 2010, Held As Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings
PublicationTitle Security Technology, Disaster Recovery and Business Continuity
PublicationYear 2010
Publisher Springer Berlin / Heidelberg
Springer Berlin Heidelberg
Publisher_xml – name: Springer Berlin / Heidelberg
– name: Springer Berlin Heidelberg
SSID ssj0000446767
ssj0000580895
ssib054953581
Score 1.412506
Snippet Hash chains have been used as OTP generators. Lamport hashes have an intensive computation cost and a chain length restriction. A solution for signature chains...
SourceID springer
proquest
SourceType Publisher
StartPage 161
SubjectTerms Authentication’s Factors
Lamport Hashing
Nested Hash Chains
One Time Password
Title One-Time Password System with Infinite Nested Hash Chains
URI http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=3066171&ppg=171
http://link.springer.com/10.1007/978-3-642-17610-4_18
Volume 122
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Pb9MwFLa6cgEOwABt44dy4FYFxY0TO0eEispG4bKh3Sw7dmilNkNNIyT-p_2PvBfbWTompHFJK9dtkvde7eeX7_tMyLvKsHLKNIt5YnTMUsFioYWOTVLC4gD11bsn-Iuv-fyCnV5ml6PR9QC11O70-_L3nbyS__EqtIFfkSV7D8_2PwoN8B78C0fwMBxvJb_7ZVbH4fA7zw2q490AsmoUih9gQojwTKev1OPbUY1qVberXV9Kn62NrbbqV_ftxdVSwfw4mauN6XucLV2VdNHChxtlJmfLdrtVmz5Y1j8QxKgdVht6r-0eTP5bbWOkmkC62iAm0XiddFcE_lxXK0x8YbzF0iuculkiCmDl64hoSdvsM1kaR1Z0G1J4SHNPwwzj1bCg0eHihgWNUNCc_EPvq-OeMFhN5UkxHL1FnsVJ4UsodtjmlGX8KE2d_ruf8KnbueSvuWQIH4GToZQmXCyTVByQAy7YmDz4MDv98j0MXxlCdYOaXJcIwFKb--zOSc2LRHT7APUXimyjcCPc6UHd3NiA6XnXVeytiW49xu-yo_On5DEyZiKksoA7npGRrQ_Jk-CeyLvjkDwaiF8-J0UIiyiEReTCIsKwiEJYRC4sIgyLyIXFC3LxaXb-cR77jTzinzSD_6yxWVoaqrU1SOU2qpwaqjgvhSqyUuS5gbSeTs20pErBnCOKSmeWgbW4hvWHSl-ScX1V2yMSJalOq4ymVKsESdGFgUmKZYzyMuVVYo5JHIwiO7iBxziXzgSNhCUyJO1U0oJLeD0mk2A5id0bGXS8weQylWBy2ZlcoslP7tX7FXl4E9-vyXi3be0bSGF3-q0PnT84FpFi
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Security+Technology%2C+Disaster+Recovery+and+Business+Continuity&rft.au=Eldefrawy%2C+Mohamed+Hamdy&rft.au=Khan%2C+Muhammad+Khurram&rft.au=Alghathbar%2C+Khaled&rft.atitle=One-Time+Password+System+with+Infinite+Nested+Hash+Chains&rft.series=Communications+in+Computer+and+Information+Science&rft.date=2010-01-01&rft.pub=Springer+Berlin+Heidelberg&rft.isbn=9783642176098&rft.issn=1865-0929&rft.eissn=1865-0937&rft.spage=161&rft.epage=170&rft_id=info:doi/10.1007%2F978-3-642-17610-4_18
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F3066171-l.jpg