This page has only limited features, please log in for full access.

Unclaimed
Hyunki Kim
Financial Information Security, Kookmin University, 77 Jeongneung-RO, Seongbuk-GU, Seoul 02707, Korea

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Journal article
Published: 24 April 2020 in Applied Sciences
Reads 0
Downloads 0

A one-time password (OTP) is a password that is valid for only one login session or transaction, in IT systems or digital devices. This is one of the human-centered security services and is commonly used for multi-factor authentication. This is very similar to generating pseudo-random bit streams in cryptography. However, it is only part of what is used as OTP in the bit stream. Therefore, the OTP mechanism requires an algorithm to extract portions. It is also necessary to convert hexadecimal to decimal so that the values of the bit strings are familiar to human. In this paper, we classify three algorithms for extracting the final data from the pseudo random bit sequence. We also analyze the fact that a vulnerability occurs during the extraction process, resulting in a high frequency of certain numbers; even if cryptographically secure generation algorithms are used.

ACS Style

Hyunki Kim; Juhong Han; Chanil Park; Okyeon Yi. Analysis of Vulnerabilities That Can Occur When Generating One-Time Password. Applied Sciences 2020, 10, 2961 .

AMA Style

Hyunki Kim, Juhong Han, Chanil Park, Okyeon Yi. Analysis of Vulnerabilities That Can Occur When Generating One-Time Password. Applied Sciences. 2020; 10 (8):2961.

Chicago/Turabian Style

Hyunki Kim; Juhong Han; Chanil Park; Okyeon Yi. 2020. "Analysis of Vulnerabilities That Can Occur When Generating One-Time Password." Applied Sciences 10, no. 8: 2961.