GENERATORS OF ONE-TIME TWO-FACTOR AUTHENTICATION PASSWORDS


Abstract

The paper presents algorithms for generating a one-time two-factor authentication passwords where application of trigonometric functions have been considered. To protect the opening of a one-time password, a secret string is read that consists of a sequence of randomly generated characters. The second factor is due to the fact that that the code has a certain validity period. The presented password generators allow the formation of secret words and trigonometric functions that the proposed two-factor authentication method consists of. The algorithm presented was implemented in Java Script. The algorithm includes blocks for checking randomly generated words and functions.


Keywords

password generator; two-factor authentication; data protection

Alata E., Nicomette V., Kaaniche M., Dacier M., Herrb M.: Lessons learned from the deployment of a high-interaction honeypot. Proc. Dependable Computing Conference (EDCC06), Coimbra, Portugal, October 18-20, 2006, 39–46.

Ayankoya F., Ohwo B.: Brute-Force Attack Prevention in Cloud Computing Using One-Time Password and Cryptographic Hash Function. International Journal of Computer Science and Information Security (IJCSIS) 17(2)/2019, 7–19.

Bahaa Q.M.: Preventing brute force attack through the analyzing log. Iraqi Journal of Science 55(3)/2013, 663–667.

https://www.nist.gov (available 02.09.2018).

https://www.seagate.com/files/www-content/solutions-content/security-and-encryption/id/docs/faq-fips-sed-lr-mb-605-2-1302-ru.pdf (available 12.10.2018).

Lamar A.: Types of threats to database security (http://www.brighthub.com/ computing/smbsecurity/articles/61402.aspx), 2012, (available 18.03.2019).

Nyssanbayeva S., Ussatova O.: Two-factor authentication in the automated control system. International scientific conference Information Science and Applied Mathematics. Almaty, 2018, Vol. II, 239–242

Download

Published : 2019-06-21


Ussatova, O., & Nyssanbayeva, S. (2019). GENERATORS OF ONE-TIME TWO-FACTOR AUTHENTICATION PASSWORDS. Informatyka, Automatyka, Pomiary W Gospodarce I Ochronie Środowiska, 9(2), 60-63. https://doi.org/10.5604/01.3001.0013.2550

Olga Ussatova  uoa_olga@mail.ru
Al-Farabi Kazakh National University, Almaty, Kazakhstan  Kazakhstan
http://orcid.org/0000-0002-5276-6118
Saule Nyssanbayeva 
Institute of Information and Computational Technologies, Almaty, Kazakhstan  Kazakhstan
http://orcid.org/0000-0002-5835-4958