Abstract
There are many ways of generating OTP in and performing user authentication, earlier authentication in a traditional way happened using username and password which became way popular in the digital world. Then, OTP came into the picture, and one-time password is the technique which is two-way authentication. This paper proposes an algorithm that will give an easy way to implement as well as a very secure OTP generation method. This OTP will be a combination of current time value and back-end server-generated value with some random operations on that combined value. This value is 32 bit in size which will give a combination of 8-digit numbers. The proposed OTP algorithm is easier to develop on the other side difficult to reverse engineer and gives efficient performance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Lamport L (1981) Password authentication with insecure communication. Commun ACM 24(11):770–772
Mraihi D, Bellare M, Hoornaert F, Naccache D, Ranen O (2005) HOTP: an HMAC-based one-time password algorithm, document 4226. Internet Engineering Task Force, Fremont, CA, USA. https://www.ietf.org/rfc/rfc4226.txt
Mraihi D, Machani S, Pei M, Rydell J (2011) TOTP: time- based OTP algorithm, document 6238. IETF, Fremont, CA, USA. https://www.ietf.org/rfc/rfc6238.txt
OTP (2019) http://sites.google.com/site/kalman/OTP. Accessed July 2019
Durstenfeld R (1964) Algorithm 235: random permutation. Commun ACM 7(7):420. https://doi.org/10.1145/364520.364540
Yassin A, Jin H, Ibrahim A, Qiang W, Zou D (2013) Cloud authentication based on an anonymous OTP. In: Han Y-H, Park D-S, Jia W, Yeo S-S (eds) Ubiquitous information technologies and applications. Springer, Dordrecht, The Netherlands, pp 423–431
https://en.wikipedia.org/wiki/Fisher%E2%80%93Yates_shuffle#cite_note-cacm-2. Accessed Aug 2019
Haller N (1995) The S/Key one-time password system, document 1760. Internet Engineering Task Force, Fremont, CA, USA. https://www.ietf.org/rfc/rfc1760.txt
IETF RFC 2289, A one-time password system, Feb 1998
Erdem E, Sandkkaya MT (2019) OTPAAS one time password as a service member. IEEE Trans Inf Forensics Secur 14(3)
Eldefrawy MH, Khan MK, Alghathbar K, Kim T-H, Elkamchouchi H (2012) Mobile one-time passwords: two-factor authentication using mobile phones. Secur Commun Netw 5(5):508–516
Acknowledgements
This is a matter of pleasure for me to acknowledge my gratitude to the School of Computing and Information Technology, Reva University for giving me an opportunity to explore my abilities via this paperwork. I would like to express my sincere gratitude to our project guide, Dr. Gopal K. Shyam, for his valuable guidance and advice in completing this paperwork. Let me take this opportunity to thank the School Director, Dr. Sunil Kumar S. Manvi for the wholehearted support extended to me throughout the conduct of the study. Last but not the least, I would like to express my sincere thanks to my family members, friends for their immense support and best wishes throughout the academic duration and the preparation of this paper.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Gosavi, S.S., Shyam, G.K. (2021). A Novel Approach of OTP Generation Using Time-Based OTP and Randomization Techniques. In: Jat, D.S., Shukla, S., Unal, A., Mishra, D.K. (eds) Data Science and Security. Lecture Notes in Networks and Systems, vol 132. Springer, Singapore. https://doi.org/10.1007/978-981-15-5309-7_16
Download citation
DOI: https://doi.org/10.1007/978-981-15-5309-7_16
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-5308-0
Online ISBN: 978-981-15-5309-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)