Web Hosting How-Tos

  Home arrow Web Hosting How-Tos arrow Page 2 - One-time Passwords - Tight Security fo...
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
  >>> SIGN UP!  
  Lost Password? 

One-time Passwords - Tight Security for Sensitive Data and Responsible Users
By: Blue Moon
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 5 stars5 stars5 stars5 stars5 stars / 9

    Table of Contents:
  • One-time Passwords - Tight Security for Sensitive Data and Responsible Users
  • What Exactly is OTP?
  • OTP and Web Hosting
  • Where on the Web is OTP?

  • Rate this Article: Poor Best 
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article




    One-time Passwords - Tight Security for Sensitive Data and Responsible Users - What Exactly is OTP?

    (Page 2 of 4 )

    OTP, as the name implies, is a technology that lets a given password be used only once for authentication to access a particular resource. Thus, even if the password is intercepted, it cannot be used again. It is important to note that OTP is used for access control only and not for securing data in transmission. It guards the first step in the process who is entering. Data still must be encrypted during transfers.

    When establishing a new session, the server issues a challenge string, which is different every time, and the user types in his or her password for this session. The response the user inputs is calculated with the help of the MD4, MD5, or SHA1 hashing algorithms. The variables that are required for the calculation are the challenge phrase for the session and the password of the user.

    The hashing algorithm computes the response string (the password) and the user types it in at the prompt. It is very important to use a reliable hashing algorithm that makes it impossible to compute any one-time passwords from known previously used passwords. Often, to ensure additional security, this algorithm is tied to a physical device, such as a token that is a one of a kind, and nobody besides the user has the same. A smart card would be one example of such a token.

    The crucial part in OTP is the hashing algorithm. If it is possible to break it, then the whole system is at risk. But breaking hashing algorithms is not that easy. When users use an external device, for instance a PDA that is not part of the network, and therefore keylogger and sniffer programs are not running, the incidental breaking of the hashing algorithms is unlikely to happen.

    More Web Hosting How-Tos Articles
    More By Blue Moon


    - Phishing Scams: An Overview and How to Detec...
    - Tips for Safe Downloading Online
    - How To Avoid Spam
    - How to Get Into Ethical Hacking
    - How to Prevent Drive-by Downloads
    - Facebook Timeline Tips and Tricks
    - How to Keep Up with Facebook`s Changes
    - Wi-Fi Network Security Tips
    - Tips for Safe Online Holiday Shopping
    - Facebook Privacy: Keeping Up with the Const...
    - Tips for Facebook Privacy
    - How to Cover Your Tracks on the Web
    - SSH Keys for FileZilla and Putty in Cpanel
    - How to Create a Filezilla FTP User
    - How to Install FileZilla Server

    Developer Shed Affiliates


    © 2003-2019 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap