• Thumbnail for Time-based one-time password
    current time as a source of uniqueness. As an extension of the HMAC-based one-time password (HOTP) algorithm, it has been adopted as Internet Engineering...
    5 KB (617 words) - 04:52, 18 June 2025
  • HMAC-based one-time password (HOTP) is a one-time password (OTP) algorithm based on HMAC. It is a cornerstone of the Initiative for Open Authentication...
    10 KB (1,067 words) - 16:36, 18 July 2025
  • Thumbnail for HMAC
    In cryptography, an HMAC (sometimes expanded as either keyed-hash message authentication code or hash-based message authentication code) is a specific...
    18 KB (2,320 words) - 16:34, 18 July 2025
  • Thumbnail for Google Authenticator
    time-based one-time password (TOTP; specified in RFC 6238) and HMAC-based one-time password (HOTP; specified in RFC 4226), for authenticating users of software...
    9 KB (943 words) - 05:34, 25 May 2025
  • Comparison of OTP applications (category Password authentication)
    generate one-time passwords for two-factor authentication (2FA) systems using the time-based one-time password (TOTP) or the HMAC-based one-time password (HOTP)...
    19 KB (637 words) - 18:25, 23 June 2025
  • Thumbnail for YubiKey
    YubiKey (category Companies based in Palo Alto, California)
    support. The YubiKey implements the HMAC-based one-time password algorithm (HOTP) and the time-based one-time password algorithm (TOTP), and identifies itself...
    32 KB (2,957 words) - 11:28, 24 June 2025
  • Live Streaming HMA—High Memory Area HMAC—Hash-based message authentication code HOTP—HMAC-based one-time password HP—Hewlett-Packard HPC—High-Performance...
    112 KB (7,977 words) - 19:47, 23 July 2025
  • PBKDF2 (category Password authentication)
    PBKDF2 for password hashing. PBKDF2 applies a pseudorandom function, such as hash-based message authentication code (HMAC), to the input password or passphrase...
    13 KB (1,337 words) - 12:18, 2 June 2025
  • employ a mixture of both. HOTP: An HMAC-based one-time password algorithm (RFC 4226) TOTP: Time-based one-time password algorithm (RFC 6238) OCRA: OATH Challenge-Response...
    2 KB (168 words) - 09:58, 22 July 2025
  • signing arbitrary data. This is used as the basis for a variety of web-based technologies including JSON Web Token. JWS is a way to ensure integrity...
    5 KB (432 words) - 21:08, 15 January 2025
  • salt is random data fed as an additional input to a one-way function that hashes data, a password or passphrase. Salting helps defend against attacks...
    13 KB (1,527 words) - 22:35, 14 June 2025
  • One-time passwords are similar to TANs and used as a secondary security measure in addition to ordinary passwords. Nitrokey supports the HMAC-based One-time...
    10 KB (1,004 words) - 13:44, 31 March 2025
  • Thumbnail for MultiOTP
    portal Linux portal One-time passwords HMAC-based one-time password (HOTP) OPIE Authentication System OTPW Time-based one-time password (TOTP) Tokens Initiative...
    24 KB (3,171 words) - 11:58, 13 July 2025
  • Pepper (cryptography) (category Password authentication)
    using a Password-Based Key Derivation Function (PBKDF) with an approved Pseudorandom Function such as HMAC with SHA-3 as the hash function of the HMAC. The...
    9 KB (1,161 words) - 20:47, 25 May 2025
  • pre-shared keys, certificate-based, and username/password-based authentication. Preshared secret key is the easiest, and certificate-based is the most robust and...
    23 KB (2,070 words) - 21:35, 17 June 2025
  • Cryptographic Service Provider HMAC HMAC-based One-time Password algorithm Cryptographic hash function Hash collision Hash-based cryptography Cryptographic...
    18 KB (1,725 words) - 19:07, 26 March 2025
  • keypresses. HMAC-based one-time password employed widely in multi-factor authentication uses similar approach, but with pre-shared secret key and HMAC instead...
    6 KB (739 words) - 23:34, 5 July 2024
  • standards grew out of this work, the HMAC-based One-time Password (HOTP) algorithm and the Time-based One-time Password (TOTP) algorithm specified by RFC 4226...
    30 KB (3,661 words) - 18:03, 24 June 2025
  • 16-byte HMAC-MD5 hash of the server challenge, a fully/partially randomly generated client challenge, and an HMAC-MD5 hash of the user's password and other...
    29 KB (3,408 words) - 17:14, 6 January 2025
  • using the HMAC-SHA256 algorithm. It is later converted to a character string using the password templates. The template seed makes every password unique...
    6 KB (552 words) - 07:18, 18 October 2024
  • competition RFC 3874: "A 224-bit One-way Hash Function: SHA-224" RFC 6234: "US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF)"; contains sample C...
    52 KB (4,982 words) - 22:11, 15 July 2025
  • Thumbnail for Cryptographic hash function
    property can be used to break naive authentication schemes based on hash functions. The HMAC construction works around these problems. In practice, collision...
    49 KB (6,300 words) - 12:37, 4 July 2025
  • Channel Binding Hash Agility RFC 6560 One-Time Password (OTP) Pre-Authentication RFC 6649 Deprecate DES, RC4-HMAC-EXP, and Other Weak Cryptographic Algorithms...
    27 KB (3,023 words) - 15:26, 31 May 2025
  • password) for this access to these computers across a public network in an unsecured way poses a great risk of third parties obtaining the password and...
    41 KB (4,510 words) - 11:00, 20 July 2025
  • a key derivation function that was selected as the winner of the 2015 Password Hashing Competition. It was designed by Alex Biryukov, Daniel Dinu, and...
    14 KB (1,491 words) - 12:22, 8 July 2025
  • bcrypt is a password-hashing function designed by Niels Provos and David Mazières. It is based on the Blowfish cipher and presented at USENIX in 1999....
    27 KB (2,839 words) - 11:40, 5 July 2025
  • Rainbow table (category Hash-based data structures)
    cracking password hashes. Passwords are typically stored not in plain text form, but as hash values. If such a database of hashed passwords falls into...
    24 KB (3,486 words) - 15:08, 3 July 2025
  • 6151 was approved to update the security considerations in MD5 and HMAC-MD5. One basic requirement of any cryptographic hash function is that it should...
    46 KB (4,710 words) - 10:55, 16 June 2025
  • Thumbnail for Librem
    Librem (category Linux-based devices)
    also features one-time password storage with 3x HMAC-based One-time Password algorithm (HOTP) (RFC 4226) and 15 x Time-based One-time Password algorithm (TOTP)...
    26 KB (2,068 words) - 08:51, 8 July 2025
  • (Proposed|Historic) — HMAC-SHA-2 Authentication Protocols in the User-based Security Model (USM) for SNMPv3 RFC 7860 (Proposed) — HMAC-SHA-2 Authentication...
    40 KB (5,090 words) - 16:30, 12 June 2025