Data Protection and Security |
||||||
VII |
Identification and Entity Authentication |
|||||
VII.III |
Authentication Protocols |
|||||
One-time password schemes: The general idea here is to use each password for only one time therefore the password eavesdropped is not useful for impersonation. In chapter 3, we have seen hash chain based one-time password (OTP) schemes. In a bigger picture, we can identify three variations of OTP schemes:
|
||||||
VII.III.I Q |
[+] Question
[-] Question
What is the security drawback of sequentially updated OTPs? |
|||||
|
||||||
|
chapter index | |||||