About 6,820 results
Open links in new tab
  1. one time password - What are the advantages of TOTP over HOTP ...

    Feb 26, 2017 · TOTP and HOTP are intended as a form of authentication (usually as a what-you-have factor as the values are read off a token). They have nothing to do with other aspects of …

  2. How does HOTP keep in sync? - Cryptography Stack Exchange

    How does HOTP keep in sync? Ask Question Asked 14 years, 1 month ago Modified 12 years, 4 months ago

  3. hmac - How does the HOTP dynamic truncation function …

    Aug 14, 2015 · HOTP, the HMAC-based One-Time Password algorithm from RFC 4226, uses a "dynamic truncation" function to turn the 20 byte HMAC-SHA-1 value into a 31 bit string. The …

  4. hmac - Why are HOTP and TOTP implementations all using 6 …

    Most implementations use 6 digit HOTP/TOTP schemes and design their implementation of the scheme to give them a security level they are comfortable with. For HOTP, the key parameter …

  5. (How) Can we use HOTP for file encryption?

    To read: Ask for the HOTP tokens, derive the key, check that it matches. Decrypt the database key, so it can be read. Generate new HOTP tokens, use those to re-encrypt the database key …

  6. hotp - Is this the right way to implement one time pad?

    Apr 21, 2020 · I would like to know if this the right way to use the one time pad based on this table Now, my idea is to use the same Ascii #2 to again if the message is longer, I know this is bad …

  7. counter to indicate hotp count - Cryptography Stack Exchange

    I was trying to figure out how HOTP kept from wrapping over, when I saw this explanation of how it works, by Thomas Pornin [source]: The intended scenario is the following: the client has a …

  8. hotp - Is there a multi-key HMAC scheme? - Cryptography Stack …

    Apr 17, 2023 · I wonder if there is any scheme or algorithm to generate HMACs that verify with multiple keys. Suppose I have the secret keys K1, K2 and K3 and I have a message M1. Is the …

  9. one time password - Detect desynchronization in HOTP …

    In HOTP authentication, is there a way for a system to detect that the token has been desynchronized? If so how does it know that the OTP was generated from a desynchronized …

  10. collision resistance - Why is HMAC-SHA1 still considered secure ...

    Are they are saying specifically with respect to HOTP or for HMAC-SHA1 for any use? If HMAC-SHA1 is used for verifying the integrity of a document and you can find a collision, you can …