GENERATORS OF ONE-TIME TWO-FACTOR AUTHENTICATION PASSWORDS
Article Sidebar
Open full text
Issue Vol. 9 No. 2 (2019)
-
OPPORTUNITIES FOR THE OUT OF THE 1550 nm WINDOW TRANSMISSION
Jarosław Piotr Turkiewicz4-7
-
TOWARDS A DIFFERENT WORLD – ON THE POTENTIAL OF THE INTERNET OF EVERYTHING
Mirosław Płaza, Radosław Belka, Zbigniew Szcześniak8-11
-
USE OF THERMAL IMAGING IN CONSTRUCTION
Danuta Proszak-Miąsik12-15
-
THE CONSTRUCTION OF THE FEATURE VECTOR IN THE DIAGNOSIS OF SARCOIDOSIS BASED ON THE FRACTAL ANALYSIS OF CT CHEST IMAGES
Zbigniew Omiotek, Paweł Prokop16-23
-
СROSS PLATFORM TOOLS FOR MODELING AND RECOGNITION OF THE FINGERSPELLING ALPHABET OF GESTURE LANGUAGE
Serhii Kondratiuk, Iurii Krak, Waldemar Wójcik24-27
-
RESEARCH OF PARAMETERS OF FIBER-OPTICAL MEASURING SYSTEMS
Waldemar Wójcik, Aliya Kalizhanova, Gulzhan Kashaganova, Ainur Kozbakova, Zhalau Aitkulov, Zhassulan Orazbekov28-31
-
DETERMINATION OF THE PROBABILITY FACTOR OF PARTICLES MOVEMENT IN A GAS-DISPERSED TURBULENT FLOW
Saltanat Adikanova, Waldemar Wójcik, Natalya Denissova, Yerzhan Malgazhdarov, Ainagul Kadyrova32-35
-
DEVELOPMENT OF WIND ENERGY COMPLEX AUTOMATION SYSTEM
Kuanysh Mussilimov, Akhmet Ibraev, Waldemar Wójcik36-40
-
PULVERIZED COAL COMBUSTION ADVANCED CONTROL TECHNIQUES
Konrad Gromaszek41-45
-
THE PROSPECTS FOR THE USE OF INTELLIGENT SYSTEMS IN THE PROCESSES OF GRAVITATIONAL ENRICHMENT
Batyrbek Aitbaevich Suleimenov, Yelena Kulakova46-49
-
MODELING OF PROCESSES IN CRUDE OIL TREATED WITH LOW-FREQUENCY SOUNDS
Yelena Blinayeva, Saule Smailova50-53
-
INFORMATION TECHNOLOGIES FOR THE ANALYSIS OF THE STRUCTURAL CHANGES IN THE PROCESS OF IDIOPATHIC MACULAR RUPTURE DIAGNOSTICS
Sergii Pavlov, Yosyp Saldan, Dina Vovkotrub-Lyahovska, Yuliia Saldan, Valentina Vassilenko, Yuliia Yakusheva54-59
-
GENERATORS OF ONE-TIME TWO-FACTOR AUTHENTICATION PASSWORDS
Olga Ussatova, Saule Nyssanbayeva60-63
-
MATHEMATICAL MODELING OF THE PROCESS OF DRAWING AN OPTICAL FIBER USING THE LANGEVIN EQUATION
Aliya Tergeussizova64-67
-
MODERN MANAGEMENT OF NATIONAL COMPETITIVENESS
Nataliia Savina, Olha Romanko, Sergii Pavlov, Volodymyr Lytvynenko68-71
-
APPLICATION OF HYDRAULIC AUTOMATION EQUIPMENT FOR THE EFFICIENCY ENHANCEMENT OF THE OPERATION ELEMENTS OF THE MOBILE MACHINERY
Leonid Polishchuk, Leonid Kozlov, Yuri Burennikov, Vasil Strutinskiy, Valerii Kravchuk72-78
Archives
-
Vol. 11 No. 4
2021-12-20 15
-
Vol. 11 No. 3
2021-09-30 10
-
Vol. 11 No. 2
2021-06-30 11
-
Vol. 11 No. 1
2021-03-31 14
-
Vol. 10 No. 4
2020-12-20 16
-
Vol. 10 No. 3
2020-09-30 22
-
Vol. 10 No. 2
2020-06-30 16
-
Vol. 10 No. 1
2020-03-30 19
-
Vol. 9 No. 4
2019-12-16 20
-
Vol. 9 No. 3
2019-09-26 20
-
Vol. 9 No. 2
2019-06-21 16
-
Vol. 9 No. 1
2019-03-03 13
-
Vol. 8 No. 4
2018-12-16 16
-
Vol. 8 No. 3
2018-09-25 16
-
Vol. 8 No. 2
2018-05-30 18
-
Vol. 8 No. 1
2018-02-28 18
-
Vol. 7 No. 4
2017-12-21 23
-
Vol. 7 No. 3
2017-09-30 24
-
Vol. 7 No. 2
2017-06-30 27
-
Vol. 7 No. 1
2017-03-03 33
Main Article Content
DOI
Authors
Abstract
The paper presents algorithms for generating a one-time two-factor authentication passwords where application of trigonometric functions have been considered. To protect the opening of a one-time password, a secret string is read that consists of a sequence of randomly generated characters. The second factor is due to the fact that that the code has a certain validity period. The presented password generators allow the formation of secret words and trigonometric functions that the proposed two-factor authentication method consists of. The algorithm presented was implemented in Java Script. The algorithm includes blocks for checking randomly generated words and functions.
Keywords:
References
Alata E., Nicomette V., Kaaniche M., Dacier M., Herrb M.: Lessons learned from the deployment of a high-interaction honeypot. Proc. Dependable Computing Conference (EDCC06), Coimbra, Portugal, October 18-20, 2006, 39–46.
Ayankoya F., Ohwo B.: Brute-Force Attack Prevention in Cloud Computing Using One-Time Password and Cryptographic Hash Function. International Journal of Computer Science and Information Security (IJCSIS) 17(2)/2019, 7–19.
Bahaa Q.M.: Preventing brute force attack through the analyzing log. Iraqi Journal of Science 55(3)/2013, 663–667.
https://www.nist.gov (available 02.09.2018).
https://www.seagate.com/files/www-content/solutions-content/security-and-encryption/id/docs/faq-fips-sed-lr-mb-605-2-1302-ru.pdf (available 12.10.2018).
Lamar A.: Types of threats to database security (http://www.brighthub.com/ computing/smbsecurity/articles/61402.aspx), 2012, (available 18.03.2019).
Nyssanbayeva S., Ussatova O.: Two-factor authentication in the automated control system. International scientific conference Information Science and Applied Mathematics. Almaty, 2018, Vol. II, 239–242
Article Details
Abstract views: 346
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
