Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
RFC1760: The S/KEY One-Time Password System1995 RFC
Publisher:
  • RFC Editor
  • United States
Published:01 February 1995
Reflects downloads up to 05 Mar 2025Bibliometrics
Skip Abstract Section
Abstract

This document describes the S/KEY* One-Time Password system as released for public use by Bellcore and as described in reference [3]. A reference implementation and documentation are available by anonymous ftp from ftp.bellcore.com in the directories pub/nmh/...

RFC Downloads

Cited By

  1. ACM
    Kalash , Ghosh B and Addya S Enhancing Security in Smart Contract Wallets : An OTP Based 2-Factor Authentication Approach Proceedings of the 26th International Conference on Distributed Computing and Networking, (211-220)
  2. Han Y, Xu C, Jiang C and Chen K (2024). A Secure Two-Factor Authentication Key Exchange Scheme, IEEE Transactions on Dependable and Secure Computing, 21:6, (5681-5693), Online publication date: 1-Nov-2024.
  3. Cao X, Yang Z, Ning J, Jin C, Lu R, Liu Z and Zhou J (2024). Dynamic Group Time-Based One-Time Passwords, IEEE Transactions on Information Forensics and Security, 19, (4897-4913), Online publication date: 1-Jan-2024.
  4. ACM
    Alizadeh M, Tadayon M, Sakurai K, Anada H and Jolfaei A (2021). A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing, ACM Transactions on Internet Technology, 21:4, (1-16), Online publication date: 22-Jul-2021.
  5. ACM
    Berenjestanaki M, Conti M and Gangwal A On the Exploitation of Online SMS Receiving Services to Forge ID Verification Proceedings of the 14th International Conference on Availability, Reliability and Security, (1-5)
  6. Valsesia D, Coluccia G, Bianchi T and Magli E (2017). User Authentication via PRNU-Based Physical Unclonable Functions, IEEE Transactions on Information Forensics and Security, 12:8, (1941-1956), Online publication date: 1-Aug-2017.
  7. Lee J, Seo J, Ko H and Kim H (2017). TARD, Journal of Computer and System Sciences, 86:C, (59-69), Online publication date: 1-Jun-2017.
  8. Zhao D and Luo W (2017). One-time password authentication scheme based on the negative database, Engineering Applications of Artificial Intelligence, 62:C, (396-404), Online publication date: 1-Jun-2017.
  9. Kang K, Baek Y, Lee S and Son S An Attack-Resilient Source Authentication Protocol in Controller Area Network Proceedings of the Symposium on Architectures for Networking and Communications Systems, (109-118)
  10. Sharma D, Jinwala D and Zeadally S (2017). Multiuser Searchable Encryption with Token Freshness Verification, Security and Communication Networks, 2017, Online publication date: 1-Jan-2017.
  11. Yum D, Kim J, Lee P and Hong S On fast verification of hash chains Proceedings of the 2010 international conference on Topics in Cryptology, (382-396)
  12. Gouda M, Liu A, Leung L and Alam M (2007). SPP, Computer Networks: The International Journal of Computer and Telecommunications Networking, 51:13, (3715-3726), Online publication date: 1-Sep-2007.
  13. Lee D, You I, Kim S, Lee Y, Han J and Chung K Intelligent home network authentication Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking, (214-223)
  14. ACM
    Agarwal Y, Chandra R, Wolman A, Bahl P, Chin K and Gupta R Wireless wakeups revisited Proceedings of the 5th international conference on Mobile systems, applications and services, (179-191)
  15. Mannan M and Van Oorschot P Using a personal device to strengthen password authentication from an untrusted computer Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security, (88-103)
  16. ACM
    Traeger A, Joukov N, Sipek J and Zadok E Using free web storage for data backup Proceedings of the second ACM workshop on Storage security and survivability, (73-78)
  17. Chalkias K and Stephanides G Timed release cryptography from bilinear pairings using hash chains Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security, (130-140)
  18. Liao I, Lee C and Hwang M (2006). A password authentication scheme over insecure networks, Journal of Computer and System Sciences, 72:4, (727-740), Online publication date: 1-Jun-2006.
  19. Yoon E and Yoo K One-time password authentication scheme using smart cards providing user anonymity Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V, (303-311)
  20. You I and Jung E A light weight authentication protocol for digital home networks Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV, (416-423)
  21. Goyal V, Jain A and Quisquater J Improvements to mitchell's remote user authentication protocol Proceedings of the 8th international conference on Information Security and Cryptology, (69-80)
  22. `Xiao-rong C, Qi-yuan F, Chao D and Ming-quan Z Research and Realization of Authentication Technique Based on OTP and Kerberos Proceedings of the Eighth International Conference on High-Performance Computing in Asia-Pacific Region
  23. Vaudenay S Secure communications over insecure channels based on short authenticated strings Proceedings of the 25th annual international conference on Advances in Cryptology, (309-326)
  24. Wong C and Chan A Immediate data authentication for multicast in resource constrained network Proceedings of the 10th Australasian conference on Information Security and Privacy, (113-121)
  25. Hu Y, Jakobsson M and Perrig A Efficient constructions for one-way hash chains Proceedings of the Third international conference on Applied Cryptography and Network Security, (423-441)
  26. Kim S Scalable hash chain traversal for mobile devices Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I, (359-367)
  27. ACM
    Chang Y, Chang C and Kuo J (2004). A secure one-time password authentication scheme using smart cards without limiting login times, ACM SIGOPS Operating Systems Review, 38:4, (80-90), Online publication date: 1-Oct-2004.
  28. ACM
    Park T and Shin K (2004). LiSP, ACM Transactions on Embedded Computing Systems, 3:3, (634-660), Online publication date: 1-Aug-2004.
  29. ACM
    Lin M and Chang C (2004). A secure one-time password authentication scheme with low-computation for mobile communications, ACM SIGOPS Operating Systems Review, 38:2, (76-84), Online publication date: 1-Apr-2004.
  30. Blundo C and Cimato S (2004). A Software Infrastructure for Authenticated Web Metering, Computer, 37:4, (28-33), Online publication date: 1-Apr-2004.
  31. Fu K, Sit E, Smith K and Feamster N Dos and don'ts of client authentication on the web Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
  32. ACM
    Sierra J and Shepherd S (2000). New phase 1 exchange mode for IKE framework, ACM SIGOPS Operating Systems Review, 34:4, (34-40), Online publication date: 1-Oct-2000.
  33. de Raadt T, Hallqvist N, Grabowski A, Keromytis A and Provos N Cryptography in OpenBSD Proceedings of the annual conference on USENIX Annual Technical Conference, (33-33)
  34. ACM
    Halevi S and Krawczyk H Public-key cryptography and password protocols Proceedings of the 5th ACM conference on Computer and communications security, (122-131)
  35. ACM
    de Vivo M, de Vivo G and Isern G (1998). Internet security attacks at the basic levels, ACM SIGOPS Operating Systems Review, 32:2, (4-15), Online publication date: 1-Apr-1998.
  36. ACM
    Mitchell C and Chen L (1996). Comments on the S/KEY user authentication scheme, ACM SIGOPS Operating Systems Review, 30:4, (12-16), Online publication date: 1-Oct-1996.
  37. Vixie P DNS and BIND security issues Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5, (19-19)
Contributors

Recommendations