Skip to main content

A Novel Approach of OTP Generation Using Time-Based OTP and Randomization Techniques

  • Conference paper
  • First Online:
Data Science and Security

Abstract

There are many ways of generating OTP in and performing user authentication, earlier authentication in a traditional way happened using username and password which became way popular in the digital world. Then, OTP came into the picture, and one-time password is the technique which is two-way authentication. This paper proposes an algorithm that will give an easy way to implement as well as a very secure OTP generation method. This OTP will be a combination of current time value and back-end server-generated value with some random operations on that combined value. This value is 32 bit in size which will give a combination of 8-digit numbers. The proposed OTP algorithm is easier to develop on the other side difficult to reverse engineer and gives efficient performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lamport L (1981) Password authentication with insecure communication. Commun ACM 24(11):770–772

    Google Scholar 

  2. Mraihi D, Bellare M, Hoornaert F, Naccache D, Ranen O (2005) HOTP: an HMAC-based one-time password algorithm, document 4226. Internet Engineering Task Force, Fremont, CA, USA. https://www.ietf.org/rfc/rfc4226.txt

  3. Mraihi D, Machani S, Pei M, Rydell J (2011) TOTP: time- based OTP algorithm, document 6238. IETF, Fremont, CA, USA. https://www.ietf.org/rfc/rfc6238.txt

  4. OTP (2019) http://sites.google.com/site/kalman/OTP. Accessed July 2019

  5. Durstenfeld R (1964) Algorithm 235: random permutation. Commun ACM 7(7):420. https://doi.org/10.1145/364520.364540

    Article  Google Scholar 

  6. Yassin A, Jin H, Ibrahim A, Qiang W, Zou D (2013) Cloud authentication based on an anonymous OTP. In: Han Y-H, Park D-S, Jia W, Yeo S-S (eds) Ubiquitous information technologies and applications. Springer, Dordrecht, The Netherlands, pp 423–431

    Google Scholar 

  7. https://en.wikipedia.org/wiki/Fisher%E2%80%93Yates_shuffle#cite_note-cacm-2. Accessed Aug 2019

  8. Haller N (1995) The S/Key one-time password system, document 1760. Internet Engineering Task Force, Fremont, CA, USA. https://www.ietf.org/rfc/rfc1760.txt

  9. IETF RFC 2289, A one-time password system, Feb 1998

    Google Scholar 

  10. Erdem E, Sandkkaya MT (2019) OTPAAS one time password as a service member. IEEE Trans Inf Forensics Secur 14(3)

    Google Scholar 

  11. Eldefrawy MH, Khan MK, Alghathbar K, Kim T-H, Elkamchouchi H (2012) Mobile one-time passwords: two-factor authentication using mobile phones. Secur Commun Netw 5(5):508–516

    Google Scholar 

Download references

Acknowledgements

This is a matter of pleasure for me to acknowledge my gratitude to the School of Computing and Information Technology, Reva University for giving me an opportunity to explore my abilities via this paperwork. I would like to express my sincere gratitude to our project guide, Dr. Gopal K. Shyam, for his valuable guidance and advice in completing this paperwork. Let me take this opportunity to thank the School Director, Dr. Sunil Kumar S. Manvi for the wholehearted support extended to me throughout the conduct of the study. Last but not the least, I would like to express my sincere thanks to my family members, friends for their immense support and best wishes throughout the academic duration and the preparation of this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Siddharth Suresh Gosavi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gosavi, S.S., Shyam, G.K. (2021). A Novel Approach of OTP Generation Using Time-Based OTP and Randomization Techniques. In: Jat, D.S., Shukla, S., Unal, A., Mishra, D.K. (eds) Data Science and Security. Lecture Notes in Networks and Systems, vol 132. Springer, Singapore. https://doi.org/10.1007/978-981-15-5309-7_16

Download citation

Publish with us

Policies and ethics