• current time as a source of uniqueness. As an extension of the HMAC-based one-time password algorithm (HOTP), it has been adopted as Internet Engineering...
    6 KB (631 words) - 01:44, 1 June 2024
  • HMAC-based one-time password (HOTP) is a one-time password (OTP) algorithm based on HMAC. It is a cornerstone of the Initiative for Open Authentication...
    11 KB (1,150 words) - 16:06, 3 July 2024
  • Thumbnail for Google Authenticator
    time-based one-time password (TOTP; specified in RFC 6238) and HMAC-based one-time password (HOTP; specified in RFC 4226), for authenticating users of software...
    10 KB (911 words) - 22:04, 29 July 2024
  • Comparison of OTP applications (category Password authentication)
    generate one-time passwords for two-factor authentication (2FA) systems using the time-based one-time password (TOTP) or the HMAC-based one-time password (HOTP)...
    12 KB (446 words) - 14:14, 22 July 2024
  • Thumbnail for YubiKey
    YubiKey (category Companies based in Palo Alto, California)
    support. The YubiKey implements the HMAC-based one-time password algorithm (HOTP) and the time-based one-time password algorithm (TOTP), and identifies itself...
    29 KB (2,738 words) - 17:33, 5 June 2024
  • PBKDF2 (category Password authentication)
    PBKDF2 for password hashing. PBKDF2 applies a pseudorandom function, such as hash-based message authentication code (HMAC), to the input password or passphrase...
    13 KB (1,341 words) - 15:37, 30 May 2024
  • keypresses. HMAC-based one-time password employed widely in multi-factor authentication uses similar approach, but with pre-shared secret key and HMAC instead...
    6 KB (739 words) - 23:34, 5 July 2024
  • employ a mixture of both. HOTP: An HMAC-based one-time password algorithm (RFC 4226) TOTP: Time-based one-time password algorithm (RFC 6238) OCRA: OATH Challenge-Response...
    1 KB (113 words) - 13:29, 15 May 2024
  • using the HMAC-SHA256 algorithm. It is later converted to a character string using the password templates. The template seed makes every password unique...
    6 KB (552 words) - 14:33, 29 October 2023
  • signing arbitrary data. This is used as the basis for a variety of web-based technologies including JSON Web Token. JWS is a way to ensure integrity...
    5 KB (432 words) - 09:02, 21 May 2024
  • Pepper (cryptography) (category Password authentication)
    using a Password-Based Key Derivation Function (PBKDF) with an approved Pseudorandom Function such as HMAC with SHA-3 as the hash function of the HMAC. The...
    8 KB (1,061 words) - 13:08, 12 July 2024
  • to decrypt the passwords. Prior to June 2012, customers had by default a single PBKDF2-HMAC-SHA-256 hash applied to their master password, with site usernames...
    30 KB (2,705 words) - 20:04, 4 June 2024
  • standards grew out of this work, the HMAC-based One-time Password (HOTP) algorithm and the Time-based One-time Password (TOTP) algorithm specified by RFC 4226...
    30 KB (3,661 words) - 22:51, 18 January 2024
  • (Proposed|Historic) — HMAC-SHA-2 Authentication Protocols in the User-based Security Model (USM) for SNMPv3 RFC 7860 (Proposed) — HMAC-SHA-2 Authentication...
    40 KB (5,033 words) - 15:23, 24 July 2024
  • One-time passwords are similar to TANs and used as a secondary security measure in addition to ordinary passwords. Nitrokey supports the HMAC-based One-time...
    10 KB (999 words) - 01:15, 30 July 2024
  • pre-shared keys, certificate-based, and username/password-based authentication. Preshared secret key is the easiest, and certificate-based is the most robust and...
    22 KB (1,965 words) - 18:00, 27 June 2024
  • Thumbnail for MultiOTP
    thesis Linux portal One-time passwords HMAC-based one-time password (HOTP) OPIE Authentication System OTPW Time-based one-time password (TOTP) Tokens Initiative...
    24 KB (3,159 words) - 13:49, 22 June 2024
  • Channel Binding Hash Agility RFC 6560 One-Time Password (OTP) Pre-Authentication RFC 6649 Deprecate DES, RC4-HMAC-EXP, and Other Weak Cryptographic Algorithms...
    27 KB (3,053 words) - 22:13, 7 May 2024
  • Encryption Standard International Data Encryption Algorithm HMAC HMAC-based One-time Password algorithm Cryptographic hash function Hash collision List...
    19 KB (1,784 words) - 10:05, 3 June 2024
  • 16-byte HMAC-MD5 hash of the server challenge, a fully/partially randomly generated client challenge, and an HMAC-MD5 hash of the user's password and other...
    29 KB (3,405 words) - 19:34, 21 June 2024
  • bcrypt is a password-hashing function designed by Niels Provos and David Mazières, based on the Blowfish cipher and presented at USENIX in 1999. Besides...
    26 KB (2,753 words) - 04:19, 2 July 2024
  • Thumbnail for Digest access authentication
    access authentication is one of the agreed-upon methods a web server can use to negotiate credentials, such as username or password, with a user's web browser...
    24 KB (2,843 words) - 13:39, 13 July 2024
  • Rainbow table (category Hash-based data structures)
    cracking password hashes. Passwords are typically stored not in plain text form, but as hash values. If such a database of hashed passwords falls into...
    24 KB (3,446 words) - 08:05, 23 June 2024
  • Thumbnail for Cryptographic hash function
    property can be used to break naive authentication schemes based on hash functions. The HMAC construction works around these problems. In practice, collision...
    48 KB (6,228 words) - 08:01, 25 June 2024
  • possibly weak key, typically a password or passphrase, more secure against a brute-force attack by increasing the resources (time and possibly space) it takes...
    14 KB (1,817 words) - 16:14, 17 July 2024
  • and password) for this access to these computers across a public network in an unsecured way, poses a great risk of 3rd parties obtaining the password and...
    38 KB (4,271 words) - 01:17, 21 July 2024
  • cryptanalysis • Hill cipher • History of cryptography • HMACHMAC-based One-time Password algorithm (HOTP) • Horst Feistel • Howard Heys • Https •...
    67 KB (2,933 words) - 23:58, 6 June 2024
  • a key derivation function that was selected as the winner of the 2015 Password Hashing Competition. It was designed by Alex Biryukov, Daniel Dinu, and...
    14 KB (1,491 words) - 21:00, 3 April 2024
  • authentication code: a keyed hash function like hash message authentication code (HMAC). That is, SHA is designed so that it is difficult for an attacker to find...
    13 KB (1,338 words) - 13:36, 23 May 2024
  • Thumbnail for One-way compression function
    certainly do not have. So far, no practical attack has been based on this property, but one should be aware of this "feature". The fixed-points can be...
    24 KB (3,977 words) - 03:22, 7 June 2024