Cargando…

An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree

The Time-based One-Time Password (TOTP) algorithm is commonly used for two-factor authentication. In this algorithm, a shared secret is used to derive a One-Time Password (OTP). However, in TOTP, the client and the server need to agree on a shared secret (i.e., a key). As a consequence, an adversary...

Descripción completa

Detalles Bibliográficos
Autores principales: Yin, Xinming, He, Junhui, Guo, Yi, Han, Dezhi, Li, Kuan-Ching, Castiglione, Arcangelo
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7599477/
https://www.ncbi.nlm.nih.gov/pubmed/33050225
http://dx.doi.org/10.3390/s20205735
_version_ 1783602884203511808
author Yin, Xinming
He, Junhui
Guo, Yi
Han, Dezhi
Li, Kuan-Ching
Castiglione, Arcangelo
author_facet Yin, Xinming
He, Junhui
Guo, Yi
Han, Dezhi
Li, Kuan-Ching
Castiglione, Arcangelo
author_sort Yin, Xinming
collection PubMed
description The Time-based One-Time Password (TOTP) algorithm is commonly used for two-factor authentication. In this algorithm, a shared secret is used to derive a One-Time Password (OTP). However, in TOTP, the client and the server need to agree on a shared secret (i.e., a key). As a consequence, an adversary can construct an OTP through the compromised key if the server is hacked. To solve this problem, Kogan et al. proposed T/Key, an OTP algorithm based on a hash chain. However, the efficiency of OTP generation and verification is low in T/Key. In this article, we propose a novel and efficient Merkle tree-based One-Time Password (MOTP) algorithm to overcome such limitations. Compared to T/Key, this proposal reduces the number of hash operations to generate and verify the OTP, at the cost of small server storage and tolerable client storage. Experimental analysis and security evaluation show that MOTP can resist leakage attacks against the server and bring a tiny delay to two-factor authentication and verification time.
format Online
Article
Text
id pubmed-7599477
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-75994772020-11-01 An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree Yin, Xinming He, Junhui Guo, Yi Han, Dezhi Li, Kuan-Ching Castiglione, Arcangelo Sensors (Basel) Article The Time-based One-Time Password (TOTP) algorithm is commonly used for two-factor authentication. In this algorithm, a shared secret is used to derive a One-Time Password (OTP). However, in TOTP, the client and the server need to agree on a shared secret (i.e., a key). As a consequence, an adversary can construct an OTP through the compromised key if the server is hacked. To solve this problem, Kogan et al. proposed T/Key, an OTP algorithm based on a hash chain. However, the efficiency of OTP generation and verification is low in T/Key. In this article, we propose a novel and efficient Merkle tree-based One-Time Password (MOTP) algorithm to overcome such limitations. Compared to T/Key, this proposal reduces the number of hash operations to generate and verify the OTP, at the cost of small server storage and tolerable client storage. Experimental analysis and security evaluation show that MOTP can resist leakage attacks against the server and bring a tiny delay to two-factor authentication and verification time. MDPI 2020-10-09 /pmc/articles/PMC7599477/ /pubmed/33050225 http://dx.doi.org/10.3390/s20205735 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Yin, Xinming
He, Junhui
Guo, Yi
Han, Dezhi
Li, Kuan-Ching
Castiglione, Arcangelo
An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree
title An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree
title_full An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree
title_fullStr An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree
title_full_unstemmed An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree
title_short An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree
title_sort efficient two-factor authentication scheme based on the merkle tree
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7599477/
https://www.ncbi.nlm.nih.gov/pubmed/33050225
http://dx.doi.org/10.3390/s20205735
work_keys_str_mv AT yinxinming anefficienttwofactorauthenticationschemebasedonthemerkletree
AT hejunhui anefficienttwofactorauthenticationschemebasedonthemerkletree
AT guoyi anefficienttwofactorauthenticationschemebasedonthemerkletree
AT handezhi anefficienttwofactorauthenticationschemebasedonthemerkletree
AT likuanching anefficienttwofactorauthenticationschemebasedonthemerkletree
AT castiglionearcangelo anefficienttwofactorauthenticationschemebasedonthemerkletree
AT yinxinming efficienttwofactorauthenticationschemebasedonthemerkletree
AT hejunhui efficienttwofactorauthenticationschemebasedonthemerkletree
AT guoyi efficienttwofactorauthenticationschemebasedonthemerkletree
AT handezhi efficienttwofactorauthenticationschemebasedonthemerkletree
AT likuanching efficienttwofactorauthenticationschemebasedonthemerkletree
AT castiglionearcangelo efficienttwofactorauthenticationschemebasedonthemerkletree