• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here:Home » Basics of One-Time Password

By Abhishek Ghosh February 18, 2024 9:32 am Updated on February 18, 2024

Basics of One-Time Password

Advertisement

A one-time password is a password used for authentication or authorization. Each one-time password is valid for a single use only and cannot be used a second time. Accordingly, each authentication or authorization requires a new one-time password. It is safe against passive attacks, i.e. eavesdropping. Replay attacks are also impossible. One-time passwords do not help against the man-in-the-middle attack scenario. Also, the use of one-time passwords has no influence on the security of an encryption method.

The challenge with one-time password is how both sides can know which password is valid for a particular login process. There are two ways to do this: password lists or password generators.

 

OTP Password Lists

 

With this system, ready-made lists of passwords are stored on both sides. This list is either processed sequentially (i.e. the entries are numbered consecutively) or a value that has not yet been used is freely selected. This value is transmitted as a password and removed from the list on both sides. The TAN lists in online banking are an example of a password list.

Advertisement

---

There is the following difference between the above-mentioned variants: In the case of one-time passwords that are used one after the other, i.e. sequentially, there is exactly one valid value at any given time, namely the first one that has not yet been used. In the case of one-time passwords, which can be selected arbitrarily by the sender from a list, there are exactly as many valid values at any given time as there are unused values on the list.

One disadvantage is a possible loss of the password list. An attacker who gets hold of them (e.g. in the event of a system break-in) knows all possible one-time passwords. A system that does not have to store the list in its entirety is therefore preferable to this method.

Basics of One-Time Password

 

OTP Password Generators

 

A password generator is a program that automatically generates a password. In the case of password generators, a special algorithm generates an up-to-date password at any given time. A distinction must be made between three methods:

  • Timed Generators
  • Event-Driven Generators
  • Challenge-Response-Driven Generators

In all three, it is not the algorithm itself that is transmitted, but only the proof, the result of the algorithm. With the correct result, the client proves that it has the right algorithm and, if necessary, the right initialization.

Although the server performs the same calculation as the client (the security token), it generally accepts and calculates multiple one-time passwords within a tolerance range, as the clock built into the token may not be 100% accurate. Nevertheless, each one-time password has a well-defined time interval for its validity, which is usually between 1 and 15 minutes.

If a single token is used by several independent entities, eavesdropping on the one-time password at one location would open up a security risk for the other entities within the tolerance range.

In the event-driven method, as in the timed method, the server performs the same calculation that took place on the client side, and here too it calculates and accepts several one-time passwords within a tolerance range, excluding those that have already been used. The reason is that occasionally the owner would not be able to use a generated password. This method is much gentler on the batteries of a corresponding device (token). It is also possible to operate it without a permanent power supply by simply storing the last value used and therefore devalued anyway.

If a single token is used by multiple independent entities, all entities must be notified in a timely manner of any use in any event.

There are no synchronization problems in the case of a challenge-response procedure. In this procedure, the server specifies a task (challenge) that the client must answer (response). In other words, the client receives a value from the server as input and calculates a one-time password based on that.

The advantage of this procedure is that the challenge can be set completely independently. If there is no algorithm on the server side that can be calculated in advance, then there is no way to calculate a response in advance on the client or cracker side. This also makes it possible to use a single algorithm for several independent bodies, which does not reduce security. There are solutions that use a device (token) to calculate the response. In this case, the technique described below can also be used, with the initial value as a challenge.

The prerequisite for the one-time password procedure is that both parties involved (client and server) have a common, secret password.

 

When Does it Make Sense to Use One-Time Passwords?

 

The fact that one-time passwords become invalid after a short period of time prevents potential attackers from obtaining the codes and reusing them afterwards. The use of one-time passwords is therefore particularly recommended for websites and online services that use particularly important and sensitive data. For example, in the case of:

  1. Sensitive company data
  2. Confidential communication channels
  3. Online Banking
  4. Financial services such as cryptocurrency exchanges or online stock accounts

One-time passwords are therefore not urgently required for every website. However, due to increasing cybercrime, it is generally advisable to pay attention to strong passwords.

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Basics of One-Time Password

  • How passwords work maintaining your online security

    How passwords work? How hackers crack the passwords to invade systems? How the encryption of passwords are done? Everything explained regarding passwords.

  • WROOM ESP32 Example Codes For IBM Watson IoT Platform

    Here Are Few WROOM ESP32 Example Codes For IBM Watson IoT Platform So That Anyone Can Get Started With Both of Them Without Huge Experience.

  • What is JSON Web Token (JWT)?

    A JSON Web Token (JWT) is a JSON-based access token standardized according to RFC. The JWT enables the exchange of verifiable claims. It is typically used to exchange a user’s identity between an identity provider and a service provider in a third-party system. JWTs are particularly suitable for implementing “stateless sessions”, as all authentication-relevant information […]

  • Connecting ESP32 Arduino with DHT11 with IBM Watson IoT

    Earlier, we described how to create graph on IBM Watson IoT dashboard by using the default widgets. In previous guide, we described how to use ESP32 Arduino with DHT11 sensor. Here is the Code and Diagram to Connect ESP32 Arduino with DHT11 with IBM Watson IoT and Get Odometer Like Gauges on Dashboard. For this […]

performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

vpsdime

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Cloud-Powered Play: How Streaming Tech is Reshaping Online GamesSeptember 3, 2025
  • How to Use Transcribed Texts for MarketingAugust 14, 2025
  • nRF7002 DK vs ESP32 – A Technical Comparison for Wireless IoT DesignJune 18, 2025
  • Principles of Non-Invasive Blood Glucose Measurement By Near Infrared (NIR)June 11, 2025
  • Continuous Non-Invasive Blood Glucose Measurements: Present Situation (May 2025)May 23, 2025
PC users can consult Corrine Chorney for Security.

Want to know more about us?

Read Notability and Mentions & Our Setup.

Copyright © 2026 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy