HMAC-based One-time Password Algorithm
HOTP is an (OTP) algorithm. It is a cornerstone of (OATH).
HOTP was published as an informational RFC 4226 in December 2005, documenting the algorithm along with a Java implementation. Since then, the algorithm has been adopted by many companies worldwide (see below). The HOTP algorithm is a freely available .
Contents
Definition
Let:
- K be a secret key
- C be a counter
- HMAC(K,C) = SHA1(K ⊕ 0x5c5c… ∥ SHA1(K ⊕ 0x3636… ∥ C)) with ⊕ as XOR, ∥ as concatenation, for more details see (C is the message)
- Truncate be a function that selects 4 bytes from the result of the HMAC in a defined manner
Then HOTP(K,C) is mathematically defined by
- HOTP(K,C) = Truncate(HMAC(K,C)) & 0x7FFFFFFF
The 0x7FFFFFFF sets the result’s to zero. This avoids problems if the result is interpreted as a signed number as some processors do.
For HOTP to be useful for an individual to input to a system, the result must be converted into a HOTP value, a 6–8 digits number that is implementation dependent.
- HOTP-Value = HOTP(K,C) mod 10<sup>d</sup>, where d is the desired number of digits
—
Applications
HOTP can be used to authenticate a user in a system via an authentication server. Also, if some more steps are carried out (the server calculates subsequent OTP value and sends/displays it to the user who checks it against subsequent OTP value calculated by his token), the user can also authenticate the validation server.
Tokens
Both hardware and software tokens are available from various vendors, for some of them see references below. Hardware tokens implementing OATH HOTP tend to be significantly cheaper than their competitors based on proprietary algorithms. As of 2010, OATH HOTP hardware tokens can be purchased for a marginal price. Some products can be used for strong passwords as well as OATH HOTP.
Software tokens are available for (nearly) all major mobile/ platforms (, , , , , , after IETF adopted HOTP as RFC 4226 in December 2005, various vendors started to produce HOTP compatible tokens and/or whole authentication solutions (see above/below).
According to a paper on strong authentication (entitled “Road Map: Replacing Passwords with OTP Authentication”) published by (a division of ) in 2010, “‘s expectation is that the hardware form factor will continue to enjoy modest growth while OTPs will grow and become the default hardware platform over time.”<ref name=”gartnerotprm”/>