OTP Generation Using SHA
OTP Generation Using SHA
Volume: 3 Issue: 4
ISSN: 2321-8169
2244 2245
_______________________________________________________________________________________________
Abstract: OTP (One Time Password) is not an old term for security field in computer science. There are various algorithms available to generate
OTP for example HOTP (HMAC based OTP), TOTP (Time based OTP), S/Key. In this paper an OTP generation method is advised using SHA1 algorithm, also how it is calculated and how it delivered to end device. This paper is related to my previous paper on Securing ATM with
OTP and Biometrics.
__________________________________________________*****_________________________________________________
Introduction:
3.
4.
5.
2.
3.
4.
2.
5.
6.
2244
IJRITCC | April 2015, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
ISSN: 2321-8169
2244 2245
_______________________________________________________________________________________________
Example of OTP calculation:
2.
Table 1: User information
User Name
SAKEC
Account Number
0123456789
Mobile number
9870908062
Address
chembur
IMEI
12345678932
Current Time
10.30.12:12-12-2014
String
Hash Value
SAKEC
534480d2acc986f8ebb8
95655dc8b6280a98f57
9130516412021743522627149
Random selector in the program will select one
number randomly from that string for example say
64 (R-number) is selected from string. This
proposed system will select first number from
randomly selected number i.e. 6 (R-number).
3.
4.
Delivery of OTP:
For delivery of OTP to the user at registered mobile number,
in proposed system SMS gateway is used. There is one
constrain for OTP delivery, that is number of the user should
not be registered with DND facility. This constrain can be
resolved by bank, by purchasing better SMS gateway
service.
Advantage and Future work:
The basic advantage of this system is the generated OTP
will less repetitive, Since SHA-1 getting unique string every
time, it will produce unique hash value and produces fewer
chances of attacks.
SAKEC0123456789
e2ea34548628caf9278a
225c456c60597f26cb8
SAKEC012345678998709
08062chembur1234567893
2
fcdf34826cfd5c6c7813
b667f466fab49d609aa8
SAKEC012345678998709
08062chembur1234567893
210.30.12:12-12-2014
(raw-string)
29699c7fc6a0dc40cba6
671486393d8f59e87ec
(H-string)
References:
_______________________________________________________________________________________