Вестник КазНУ. Серия математика, механика, информатика (Apr 2019)

Software implementation of 2 FA Software implementation of two-factor authentication to ensure security when accessing an information system

  • О. А. Ussatova,
  • S. E. Nyssanbayeva,
  • Waldemar Wojcik

DOI
https://doi.org/10.26577/JMMCS-2019-1-620
Journal volume & issue
Vol. 101, no. 1
pp. 87 – 95

Abstract

Read online

The article describes methods for applying two-factor authentication (2FA). An example of two-factor authentication using mobile devices as identifiers and the generation of a temporary password based on the hash function of encryption standards is considered. For an automated control system, a two-factor authentication model and a sequential algorithm for generating a temporary password using mathematical functions have been developed. Mathematical function is selected from the array of functions. To protect the opening of a one-time password, a secret string is read, consisting of a sequence of characters that will be generated randomly.Implemented software implementation on the Node.js software platform using the JavaScript programming language, as well as frameworks and connected system libraries. A document-based database management system with open source MongoDB, using for storing and processing information. The analysis of the software implementation of the proposed algorithm.

Keywords