One-Time Password System with Infinite Nested Hash Chains
Hash chains have been used as OTP generators. Lamport hashes have an intensive computation cost and a chain length restriction. A solution for signature chains addressed this by involving public key techniques, which increased the average computation cost. Although a later idea reduced the user comp...
Saved in:
Published in | Security Technology, Disaster Recovery and Business Continuity Vol. 122; pp. 161 - 170 |
---|---|
Main Authors | , , |
Format | Book Chapter |
Language | English |
Published |
Germany
Springer Berlin / Heidelberg
2010
Springer Berlin Heidelberg |
Series | Communications in Computer and Information Science |
Subjects | |
Online Access | Get full text |
ISBN | 3642176097 9783642176098 |
ISSN | 1865-0929 1865-0937 |
DOI | 10.1007/978-3-642-17610-4_18 |
Cover
Abstract | Hash chains have been used as OTP generators. Lamport hashes have an intensive computation cost and a chain length restriction. A solution for signature chains addressed this by involving public key techniques, which increased the average computation cost. Although a later idea reduced the user computation by sharing it with the host, it couldn’t overcome the length limitation. The scheme proposed by Chefranov to eliminate the length restriction had a deficiency in the communication cost overhead. We here present an algorithm that overcomes all of these shortcomings by involving two different nested hash chains: one dedicated to seed updating and the other used for OTP production. Our algorithm provides forward and non-restricted OTP generation. We propose a random challenge–response operation mode. We analyze our proposal from the viewpoint of security and performance compared with the other algorithms. |
---|---|
AbstractList | Hash chains have been used as OTP generators. Lamport hashes have an intensive computation cost and a chain length restriction. A solution for signature chains addressed this by involving public key techniques, which increased the average computation cost. Although a later idea reduced the user computation by sharing it with the host, it couldn’t overcome the length limitation. The scheme proposed by Chefranov to eliminate the length restriction had a deficiency in the communication cost overhead. We here present an algorithm that overcomes all of these shortcomings by involving two different nested hash chains: one dedicated to seed updating and the other used for OTP production. Our algorithm provides forward and non-restricted OTP generation. We propose a random challenge–response operation mode. We analyze our proposal from the viewpoint of security and performance compared with the other algorithms. |
Author | Eldefrawy, Mohamed Hamdy Khan, Muhammad Khurram Alghathbar, Khaled |
Author_xml | – sequence: 1 givenname: Mohamed Hamdy surname: Eldefrawy fullname: Eldefrawy, Mohamed Hamdy email: meldefrawy@ksu.edu.sa organization: Center of Excellence in Information Assurance (CoEIA), King Saud University, Saudi Arabia – sequence: 2 givenname: Muhammad Khurram surname: Khan fullname: Khan, Muhammad Khurram email: mkhurram@ksu.edu.sa organization: Center of Excellence in Information Assurance (CoEIA), King Saud University, Saudi Arabia – sequence: 3 givenname: Khaled surname: Alghathbar fullname: Alghathbar, Khaled email: kalghathbar@ksu.edu.sa organization: Information Systems Department, College of Computer and Information Sciences, King Saud University, Saudi Arabia |
BookMark | eNo9kMtOwzAQRQ0URFv6ByzyAwaP7fixRBXQShVFoqwtJ3ZJoHVCHFTx97gP4c1I9-qMPGeEBqEJHqFbIHdAiLzXUmGGBacYpACCuQF1hiYpZik8ZPwcDUGJHBPN5AUanQqi5eC_oPoKDUXqpVZKX6NJjJ8kPc6FFHKI9DJ4vKq3Pnu1Me6azmVvv7H322xX91U2D-s61L3PXnwKXTazscqmla1DvEGXa7uJfnKaY_T-9LiazvBi-TyfPixwC7lS2PmclQ6KwjuiqHa2pA6slKWyOi-VEI5RDtTREqwlkim9LnLPFVGyoAwsGyN63Bvbrg4fvjNF03xFA8TsRZlkxDCTTjcHKWYvKkH8CLVd8_2T_m78nip96Du7KSvb9r6LhhEhQIIBLRMN7A8QKGd7 |
ContentType | Book Chapter |
Copyright | Springer-Verlag Berlin Heidelberg 2010 |
Copyright_xml | – notice: Springer-Verlag Berlin Heidelberg 2010 |
DBID | FFUUA |
DOI | 10.1007/978-3-642-17610-4_18 |
DatabaseName | ProQuest Ebook Central - Book Chapters - Demo use only |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISBN | 9783642176104 3642176100 |
EISSN | 1865-0937 |
Editor | Fang, Wai-Chi Kang, Heau-jo Arnett, Kirk P Khurram Khan, Muhammad Ślęzak, Dominik |
Editor_xml | – sequence: 1 fullname: Fang, Wai-Chi – sequence: 2 fullname: Ślęzak, Dominik – sequence: 3 fullname: Kang, Heau-jo – sequence: 4 fullname: Arnett, Kirk P – sequence: 5 fullname: Khurram Khan, Muhammad |
EndPage | 170 |
ExternalDocumentID | EBC3066171_197_171 |
GroupedDBID | -T. 089 0D6 0DA 20A 38. 4UP 4V3 9-X A4J AABBV ABBVZ ABMKK ABMNI ACDPG ACZTO ADVHH AEJLV AEKFX AEOKE AETDV AEZAY AHSMR ALMA_UNASSIGNED_HOLDINGS AZZ BBABE CZZ FFUUA I4C IEZ JJU MA. MYL SBO SNUHX TBMHI TPJZQ Z5O Z7R Z7S Z7U Z7V Z7W Z7X Z7Y Z7Z Z81 Z83 Z84 Z85 Z87 Z88 29F RSU |
ID | FETCH-LOGICAL-p1588-de53cd1bbed0829dac2d1a77c8a95c866d32412d2c1aa07389fb5e48087b231a3 |
ISBN | 3642176097 9783642176098 |
ISSN | 1865-0929 |
IngestDate | Tue Jul 29 19:59:24 EDT 2025 Wed May 28 23:38:58 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
LCCallNum | QA75.5-76.95 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-p1588-de53cd1bbed0829dac2d1a77c8a95c866d32412d2c1aa07389fb5e48087b231a3 |
OCLC | 693779889 |
PQID | EBC3066171_197_171 |
PageCount | 10 |
ParticipantIDs | springer_books_10_1007_978_3_642_17610_4_18 proquest_ebookcentralchapters_3066171_197_171 |
PublicationCentury | 2000 |
PublicationDate | 2010 |
PublicationDateYYYYMMDD | 2010-01-01 |
PublicationDate_xml | – year: 2010 text: 2010 |
PublicationDecade | 2010 |
PublicationPlace | Germany |
PublicationPlace_xml | – name: Germany – name: Berlin, Heidelberg |
PublicationSeriesTitle | Communications in Computer and Information Science |
PublicationSubtitle | International Conferences, SecTech and DRBC 2010, Held As Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings |
PublicationTitle | Security Technology, Disaster Recovery and Business Continuity |
PublicationYear | 2010 |
Publisher | Springer Berlin / Heidelberg Springer Berlin Heidelberg |
Publisher_xml | – name: Springer Berlin / Heidelberg – name: Springer Berlin Heidelberg |
SSID | ssj0000446767 ssj0000580895 ssib054953581 |
Score | 1.412506 |
Snippet | Hash chains have been used as OTP generators. Lamport hashes have an intensive computation cost and a chain length restriction. A solution for signature chains... |
SourceID | springer proquest |
SourceType | Publisher |
StartPage | 161 |
SubjectTerms | Authentication’s Factors Lamport Hashing Nested Hash Chains One Time Password |
Title | One-Time Password System with Infinite Nested Hash Chains |
URI | http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=3066171&ppg=171 http://link.springer.com/10.1007/978-3-642-17610-4_18 |
Volume | 122 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Pb9MwFLa6cgEOwABt44dy4FYFxY0TO0eEispG4bKh3Sw7dmilNkNNIyT-p_2PvBfbWTompHFJK9dtkvde7eeX7_tMyLvKsHLKNIt5YnTMUsFioYWOTVLC4gD11bsn-Iuv-fyCnV5ml6PR9QC11O70-_L3nbyS__EqtIFfkSV7D8_2PwoN8B78C0fwMBxvJb_7ZVbH4fA7zw2q490AsmoUih9gQojwTKev1OPbUY1qVberXV9Kn62NrbbqV_ftxdVSwfw4mauN6XucLV2VdNHChxtlJmfLdrtVmz5Y1j8QxKgdVht6r-0eTP5bbWOkmkC62iAm0XiddFcE_lxXK0x8YbzF0iuculkiCmDl64hoSdvsM1kaR1Z0G1J4SHNPwwzj1bCg0eHihgWNUNCc_EPvq-OeMFhN5UkxHL1FnsVJ4UsodtjmlGX8KE2d_ruf8KnbueSvuWQIH4GToZQmXCyTVByQAy7YmDz4MDv98j0MXxlCdYOaXJcIwFKb--zOSc2LRHT7APUXimyjcCPc6UHd3NiA6XnXVeytiW49xu-yo_On5DEyZiKksoA7npGRrQ_Jk-CeyLvjkDwaiF8-J0UIiyiEReTCIsKwiEJYRC4sIgyLyIXFC3LxaXb-cR77jTzinzSD_6yxWVoaqrU1SOU2qpwaqjgvhSqyUuS5gbSeTs20pErBnCOKSmeWgbW4hvWHSl-ScX1V2yMSJalOq4ymVKsESdGFgUmKZYzyMuVVYo5JHIwiO7iBxziXzgSNhCUyJO1U0oJLeD0mk2A5id0bGXS8weQylWBy2ZlcoslP7tX7FXl4E9-vyXi3be0bSGF3-q0PnT84FpFi |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Security+Technology%2C+Disaster+Recovery+and+Business+Continuity&rft.au=Eldefrawy%2C+Mohamed+Hamdy&rft.au=Khan%2C+Muhammad+Khurram&rft.au=Alghathbar%2C+Khaled&rft.atitle=One-Time+Password+System+with+Infinite+Nested+Hash+Chains&rft.series=Communications+in+Computer+and+Information+Science&rft.date=2010-01-01&rft.pub=Springer+Berlin+Heidelberg&rft.isbn=9783642176098&rft.issn=1865-0929&rft.eissn=1865-0937&rft.spage=161&rft.epage=170&rft_id=info:doi/10.1007%2F978-3-642-17610-4_18 |
thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F3066171-l.jpg |