[KEYPROV] FW: New Version Notification for draft-mraihi-totp-timebased-07

"Pei, Mingliang" <mpei@verisign.com> Tue, 04 January 2011 20:51 UTC

Return-Path: <mpei@verisign.com>
X-Original-To: keyprov@core3.amsl.com
Delivered-To: keyprov@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E71903A6A17 for <keyprov@core3.amsl.com>; Tue, 4 Jan 2011 12:51:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.599
X-Spam-Level:
X-Spam-Status: No, score=-10.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id naXJNFGzJUWH for <keyprov@core3.amsl.com>; Tue, 4 Jan 2011 12:51:22 -0800 (PST)
Received: from robin.verisign.com (robin.verisign.com [65.205.251.75]) by core3.amsl.com (Postfix) with ESMTP id 7C7FD3A69A9 for <keyprov@ietf.org>; Tue, 4 Jan 2011 12:51:22 -0800 (PST)
Received: from MOU1WNEXCN02.vcorp.ad.vrsn.com (mailer2.verisign.com [65.205.251.35]) by robin.verisign.com (8.12.11/8.13.4) with ESMTP id p04KrTbu016366; Tue, 4 Jan 2011 12:53:29 -0800
Received: from MOU1WNEXMB10.vcorp.ad.vrsn.com ([10.25.13.204]) by MOU1WNEXCN02.vcorp.ad.vrsn.com with Microsoft SMTPSVC(6.0.3790.4675); Tue, 4 Jan 2011 12:53:28 -0800
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Date: Tue, 04 Jan 2011 12:53:27 -0800
Message-ID: <3E5A2F1AD44F5E49A74F79AB47C0C0C901E04EAD@mou1wnexmb10.vcorp.ad.vrsn.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: New Version Notification for draft-mraihi-totp-timebased-07
Thread-Index: AcusUTVGRiW1E21UQreSkSbTcVGkFAAABe4A
From: "Pei, Mingliang" <mpei@verisign.com>
To: keyprov@ietf.org, oath_technical@v2.listbox.com
X-OriginalArrivalTime: 04 Jan 2011 20:53:28.0930 (UTC) FILETIME=[7075FC20:01CBAC51]
Subject: [KEYPROV] FW: New Version Notification for draft-mraihi-totp-timebased-07
X-BeenThere: keyprov@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "Provisioning of Symmetric Keys \(keyprov\)" <keyprov.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/keyprov>, <mailto:keyprov-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/keyprov>
List-Post: <mailto:keyprov@ietf.org>
List-Help: <mailto:keyprov-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/keyprov>, <mailto:keyprov-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Jan 2011 20:51:24 -0000

FYI. The version updated reference implementation code with a fix on
Hmac256 / Hmac512 seed data. - Ming

-----Original Message-----
From: IETF I-D Submission Tool [mailto:idsubmission@ietf.org] 
Sent: Tuesday, January 04, 2011 12:50 PM
To: Mingliang_Pei@symantec.com
Cc: davidietf@gmail.com; smachani@diversinet.com;
johan.rydell@portwise.com
Subject: New Version Notification for draft-mraihi-totp-timebased-07 


A new version of I-D, draft-mraihi-totp-timebased-07.txt has been
successfully submitted by Mingliang Pei and posted to the IETF
repository.

Filename:	 draft-mraihi-totp-timebased
Revision:	 07
Title:		 TOTP: Time-based One-time Password Algorithm
Creation_date:	 2011-01-04
WG ID:		 Independent Submission
Number_of_pages: 16

Abstract:
This document describes an extension of one-time password (OTP)
algorithm, namely the HAMC-Based One-Time Password (HOTP) Algorithm as
defined in RFC 4226, to support time-based moving factor.  The HOTP
algorithm specifies an event based OTP algorithm where the moving factor
is an event counter.  The present work bases the moving factor on a time
value.  A time-based variant of the OTP algorithm provides short-lived
OTP values, which are desirable for enhanced security.

The proposed algorithm can be used across a wide range of network
applications ranging from remote Virtual Private Network (VPN) access,
Wi-Fi network logon to transaction-oriented Web applications.
The authors believe that a common and shared algorithm will facilitate
adoption of two-factor authentication on the Internet by enabling
interoperability across commercial and open-source implementations.
 



The IETF Secretariat.