GENERATORS OF ONE-TIME TWO-FACTOR AUTHENTICATION PASSWORDS

Olga Ussatova

uoa_olga@mail.ru
Al-Farabi Kazakh National University, Almaty, Kazakhstan (Kazakhstan)
http://orcid.org/0000-0002-5276-6118

Saule Nyssanbayeva


Institute of Information and Computational Technologies, Almaty, Kazakhstan (Kazakhstan)
http://orcid.org/0000-0002-5835-4958

Abstract

The paper presents algorithms for generating a one-time two-factor authentication passwords where application of trigonometric functions have been considered. To protect the opening of a one-time password, a secret string is read that consists of a sequence of randomly generated characters. The second factor is due to the fact that that the code has a certain validity period. The presented password generators allow the formation of secret words and trigonometric functions that the proposed two-factor authentication method consists of. The algorithm presented was implemented in Java Script. The algorithm includes blocks for checking randomly generated words and functions.


Keywords:

password generator, two-factor authentication, data protection

Alata E., Nicomette V., Kaaniche M., Dacier M., Herrb M.: Lessons learned from the deployment of a high-interaction honeypot. Proc. Dependable Computing Conference (EDCC06), Coimbra, Portugal, October 18-20, 2006, 39–46.
  Google Scholar

Ayankoya F., Ohwo B.: Brute-Force Attack Prevention in Cloud Computing Using One-Time Password and Cryptographic Hash Function. International Journal of Computer Science and Information Security (IJCSIS) 17(2)/2019, 7–19.
  Google Scholar

Bahaa Q.M.: Preventing brute force attack through the analyzing log. Iraqi Journal of Science 55(3)/2013, 663–667.
  Google Scholar

https://www.nist.gov (available 02.09.2018).
  Google Scholar

https://www.seagate.com/files/www-content/solutions-content/security-and-encryption/id/docs/faq-fips-sed-lr-mb-605-2-1302-ru.pdf (available 12.10.2018).
  Google Scholar

Lamar A.: Types of threats to database security (http://www.brighthub.com/ computing/smbsecurity/articles/61402.aspx), 2012, (available 18.03.2019).
  Google Scholar

Nyssanbayeva S., Ussatova O.: Two-factor authentication in the automated control system. International scientific conference Information Science and Applied Mathematics. Almaty, 2018, Vol. II, 239–242
  Google Scholar

Download


Published
2019-06-21

Cited by

Ussatova, O., & Nyssanbayeva, S. (2019). GENERATORS OF ONE-TIME TWO-FACTOR AUTHENTICATION PASSWORDS. Informatyka, Automatyka, Pomiary W Gospodarce I Ochronie Środowiska, 9(2), 60–63. https://doi.org/10.5604/01.3001.0013.2550

Authors

Olga Ussatova 
uoa_olga@mail.ru
Al-Farabi Kazakh National University, Almaty, Kazakhstan Kazakhstan
http://orcid.org/0000-0002-5276-6118

Authors

Saule Nyssanbayeva 

Institute of Information and Computational Technologies, Almaty, Kazakhstan Kazakhstan
http://orcid.org/0000-0002-5835-4958

Statistics

Abstract views: 228
PDF downloads: 152