Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security 2017
DOI: 10.1145/3133956.3133989
|View full text |Cite
|
Sign up to set email alerts
|

T/Key

Abstract: Time-based one-time password (TOTP) systems in use today require storing secrets on both the client and the server. As a result, an attack on the server can expose all second factors for all users in the system. We present T/Key, a time-based one-time password system that requires no secrets on the server. Our work modernizes the classic S/Key system and addresses the challenges in making such a system secure and practical. At the heart of our construction is a new lower bound analyzing the hardness of inverti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 31 publications
(7 citation statements)
references
References 48 publications
(96 reference statements)
0
7
0
Order By: Relevance
“…Up to our best knowledge, our paper is the first study presenting a generalpurpose quantum-safe digital signature algorithm in a white-box security model 8 .…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…Up to our best knowledge, our paper is the first study presenting a generalpurpose quantum-safe digital signature algorithm in a white-box security model 8 .…”
Section: Methodsmentioning
confidence: 99%
“…To solve this problem for the server side, Kogan et al proposed T/Key, a time-based OTP scheme [8]. The key idea in T/Key is to map each element of a hash chain to a specific time period so that OTPs are now time dependent 7 .…”
Section: White-box Resistant Time-based Otpsmentioning
confidence: 99%
See 2 more Smart Citations
“…Kogan [53] presented a time-based offline one-time password scheme, T/Key which is based on S/Key [56] and Time-based One-time password (T-OTP) [98] using a secure hash chain. T/Key compensates for the limitations of S/Key as a password is chosen but is not valid for a long time and like S/Key, T/Key does not utilize the same hash function at every iteration of the hash chain.…”
Section: Authenticationmentioning
confidence: 99%