GENERATORS OF ONE-TIME TWO-FACTOR AUTHENTICATION PASSWORDS
Olga Ussatova
uoa_olga@mail.ruAl-Farabi Kazakh National University, Almaty, Kazakhstan (Kazakhstan)
http://orcid.org/0000-0002-5276-6118
Saule Nyssanbayeva
Institute of Information and Computational Technologies, Almaty, Kazakhstan (Kazakhstan)
http://orcid.org/0000-0002-5835-4958
Abstract
The paper presents algorithms for generating a one-time two-factor authentication passwords where application of trigonometric functions have been considered. To protect the opening of a one-time password, a secret string is read that consists of a sequence of randomly generated characters. The second factor is due to the fact that that the code has a certain validity period. The presented password generators allow the formation of secret words and trigonometric functions that the proposed two-factor authentication method consists of. The algorithm presented was implemented in Java Script. The algorithm includes blocks for checking randomly generated words and functions.
Keywords:
password generator, two-factor authentication, data protectionReferences
Alata E., Nicomette V., Kaaniche M., Dacier M., Herrb M.: Lessons learned from the deployment of a high-interaction honeypot. Proc. Dependable Computing Conference (EDCC06), Coimbra, Portugal, October 18-20, 2006, 39–46.
Google Scholar
Ayankoya F., Ohwo B.: Brute-Force Attack Prevention in Cloud Computing Using One-Time Password and Cryptographic Hash Function. International Journal of Computer Science and Information Security (IJCSIS) 17(2)/2019, 7–19.
Google Scholar
Bahaa Q.M.: Preventing brute force attack through the analyzing log. Iraqi Journal of Science 55(3)/2013, 663–667.
Google Scholar
https://www.nist.gov (available 02.09.2018).
Google Scholar
https://www.seagate.com/files/www-content/solutions-content/security-and-encryption/id/docs/faq-fips-sed-lr-mb-605-2-1302-ru.pdf (available 12.10.2018).
Google Scholar
Lamar A.: Types of threats to database security (http://www.brighthub.com/ computing/smbsecurity/articles/61402.aspx), 2012, (available 18.03.2019).
Google Scholar
Nyssanbayeva S., Ussatova O.: Two-factor authentication in the automated control system. International scientific conference Information Science and Applied Mathematics. Almaty, 2018, Vol. II, 239–242
Google Scholar
Authors
Olga Ussatovauoa_olga@mail.ru
Al-Farabi Kazakh National University, Almaty, Kazakhstan Kazakhstan
http://orcid.org/0000-0002-5276-6118
Authors
Saule NyssanbayevaInstitute of Information and Computational Technologies, Almaty, Kazakhstan Kazakhstan
http://orcid.org/0000-0002-5835-4958
Statistics
Abstract views: 263PDF downloads: 189
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.