Question

In: Computer Science

Why should a time-based authentication system invalidate the current password on a successful authentication?

Why should a time-based authentication system invalidate the current password on a successful authentication?

Solutions

Expert Solution

Time based authentication system is a system that generates some value for a time slice and that after expires as time slice expires. So when the time slice expires the password will not work.

We can explain this with the help of TTOP  -

It combines secret key with a current time stamp with the help of cryptography hash function to generate the one time password. Time stamps generally increase in 30 seconds intervals , so password generate closs together in time from the same the secret key will be equal.

So user input his/her detail and click button for authentication then website and server generate a OTP for the user. The server also runs TOTP to verify the entered password .For verifying procces the user system clock and server synchronized. A secret key is use for the server and the user for authentication proccess. When this value match with in time then there will be authentication successfully.

But in case of the value entered by user is correct and time slice expired, there will be unsuccessful authentication .

I hope that this will fulfill your requirements..

If you have any query ,kindly ask in comments

Thanking you.


Related Solutions

Please define the best practice to storage username / password authentication credentials and specify why? Hint:...
Please define the best practice to storage username / password authentication credentials and specify why? Hint: Since the username is public knowledge, the password storage can be based on.
1. Using Kerberos for authentication eliminates the need for a user to have a password for...
1. Using Kerberos for authentication eliminates the need for a user to have a password for each server or resource they want to access. True False 2. Secure hash functions provide data integrity, but not data authenticity . True False 3. Which of the following is an example of "Something you possess"? Key Face Recognition Finger print Password 4. ____________ enables the sharing of identities across different enterprises for user access to applications. Identity Federation Kerberos Realm Public-key infrastructure Multifactor...
Reusable Passwords The most common authentication credential is the reusable password, which is a string of...
Reusable Passwords The most common authentication credential is the reusable password, which is a string of characters that a user types to gain access to the resources associated with a certain username (account) on a computer. These are called reusable passwords because the user types the password each time he or she needs access to the resource. Unfortunately, the reusable password is the weakest form of authentication, and it is appropriate only for the least sensitive assets.Ease of Use and...
Should socially or culturally diverse clients mistrust the current mental health system? Why or why not?
Should socially or culturally diverse clients mistrust the current mental health system? Why or why not?
Based on your current experience & knowledge, should drugs be legalized in the United States? Why...
Based on your current experience & knowledge, should drugs be legalized in the United States? Why or Why not? Defend your stance, not just because you think so, provide supporting documentation.
What is a value-based system (versus our current volume-based system)?
What is a value-based system (versus our current volume-based system)?
Why do the current costing system and activity-based costing systems differ in the cost ?
Why do the current costing system and activity-based costing systems differ in the cost ?
Should the U.S. raise or lower federal fund rates based on the current econom? Explain why...
Should the U.S. raise or lower federal fund rates based on the current econom? Explain why in detail and give real life reasons and consequences. (Two paragraphs minimum)
(a) When there is a need to describe a system at the current time or at...
(a) When there is a need to describe a system at the current time or at a certain specified future time, why are probabilistic models considered superior to deterministic models? (b) What is the difference between descriptive models and prescriptive models? Give two examples of each.
in detail what the franchise system is, how it works, why is it successful?
  in detail what the franchise system is, how it works, why is it successful?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT