[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3133956.3133989acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Public Access

T/Key: Second-Factor Authentication From Secure Hash Chains

Published: 30 October 2017 Publication History

Abstract

Time-based one-time password (TOTP) systems in use today require storing secrets on both the client and the server. As a result, an attack on the server can expose all second factors for all users in the system. We present T/Key, a time-based one-time password system that requires no secrets on the server. Our work modernizes the classic S/Key system and addresses the challenges in making such a system secure and practical. At the heart of our construction is a new lower bound analyzing the hardness of inverting hash chains composed of independent random functions, which formalizes the security of this widely used primitive. Additionally, we develop a near-optimal algorithm for quickly generating the required elements in a hash chain with little memory on the client. We report on our implementation of T/Key as an Android application. T/Key can be used as a replacement for current TOTP systems, and it remains secure in the event of a server-side compromise. The cost, as with S/Key, is that one-time passwords are longer than the standard six characters used in TOTP.

Supplemental Material

MP4 File

References

[1]
Gildas Avoine, Pascal Junod, and Philippe Oechslin. 2008. Characterization and Improvement of Time-Memory Trade-Off Based on Perfect Tables. ACM Trans. Inf. Syst. Secur. Vol. 11, 4, Article 17 (July 2008), 22 pages./10.1145/100216.100226
[2]
Yubico [n. d.]. Trust the Net with YubiKey Strong Two-Factor Authentication. ( [n. d.]). Retrieved 08/25/2017 from https://www.yubico.com/
[3]
Andrey M Zubkov and Aleksandr A Serov 2015. Images of subset of finite set under iterations of random mappings. Discrete Mathematics and Applications Vol. 25, 3 (2015), 179--185. https://doi.org/10.1515/dma-2015-0017
[4]
Andrey M Zubkov and Aleksandr A Serov 2017. Limit theorem for the image size of a subset under compositions of random mappings. Discrete Mathematics and Applications Vol. 29, 1 (2017), 17--26. https://doi.org/10.4213/dm1403

Cited By

View all
  • (2025)Enhancing Security in Smart Contract Wallets : An OTP Based 2-Factor Authentication ApproachProceedings of the 26th International Conference on Distributed Computing and Networking10.1145/3700838.3700868(211-220)Online publication date: 4-Jan-2025
  • (2024)Quantum-Resistance Meets White-Box Cryptography: How to Implement Hash-Based Signatures against White-Box Attackers?IACR Communications in Cryptology10.62056/an59qgxqOnline publication date: 8-Jul-2024
  • (2024)Towards Building a Faster and Incentive Enabled Privacy-Preserving Proof of Location Scheme from GTOTPElectronics10.3390/electronics1308144313:8(1443)Online publication date: 11-Apr-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
October 2017
2682 pages
ISBN:9781450349468
DOI:10.1145/3133956
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 October 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. hash chains
  2. two-factor authentication

Qualifiers

  • Research-article

Funding Sources

Conference

CCS '17
Sponsor:

Acceptance Rates

CCS '17 Paper Acceptance Rate 151 of 836 submissions, 18%;
Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)189
  • Downloads (Last 6 weeks)34
Reflects downloads up to 04 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Enhancing Security in Smart Contract Wallets : An OTP Based 2-Factor Authentication ApproachProceedings of the 26th International Conference on Distributed Computing and Networking10.1145/3700838.3700868(211-220)Online publication date: 4-Jan-2025
  • (2024)Quantum-Resistance Meets White-Box Cryptography: How to Implement Hash-Based Signatures against White-Box Attackers?IACR Communications in Cryptology10.62056/an59qgxqOnline publication date: 8-Jul-2024
  • (2024)Towards Building a Faster and Incentive Enabled Privacy-Preserving Proof of Location Scheme from GTOTPElectronics10.3390/electronics1308144313:8(1443)Online publication date: 11-Apr-2024
  • (2024)Dynamic Group Time-Based One-Time PasswordsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.338635019(4897-4913)Online publication date: 2024
  • (2024)Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting TechniqueIEEE Open Journal of the Computer Society10.1109/OJCS.2024.33987945(278-289)Online publication date: 2024
  • (2024)BAESDA: A Blockchain-Assisted Efficient and Secure Data Authentication Scheme for Distributed IoT Collection SystemIEEE Sensors Journal10.1109/JSEN.2024.337014624:8(13193-13208)Online publication date: 15-Apr-2024
  • (2024)Scrutinizing Code Signing: A Study of in-Depth Threat Modeling and Defense MechanismIEEE Internet of Things Journal10.1109/JIOT.2024.345027211:24(40051-40069)Online publication date: 15-Dec-2024
  • (2024)Securing Web Access: PUF-Driven Two-Factor Authentication for Enhanced ProtectionComputer Safety, Reliability, and Security. SAFECOMP 2024 Workshops10.1007/978-3-031-68738-9_6(74-87)Online publication date: 9-Sep-2024
  • (2023)P/Key: PUF based second factor authenticationPLOS ONE10.1371/journal.pone.028018118:2(e0280181)Online publication date: 9-Feb-2023
  • (2023)HMACCE: Establishing Authenticated and Confidential Channel From Historical Data for Industrial Internet of ThingsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.323487318(1080-1094)Online publication date: 2023
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media