version 1.7, 1996/10/23 21:53:37 |
version 1.8, 1997/01/05 21:30:06 |
|
|
is a procedure for using one time passwords to authenticate access to |
is a procedure for using one time passwords to authenticate access to |
computer systems. It uses 64 bits of information transformed by the |
computer systems. It uses 64 bits of information transformed by the |
MD4, MD5, or SHA1 algorithms. The user supplies the 64 bits in the form |
MD4, MD5, or SHA1 algorithms. The user supplies the 64 bits in the form |
of 6 English words that are generated by a secure computer. |
of 6 English words that are generated by a secure computer. This |
|
implementation of |
|
.Nm s/key |
|
is RFC 1938 compliant. |
.Pp |
.Pp |
When |
When |
.Nm skey |
.Nm skey |
|
|
% |
% |
.Sh SEE ALSO |
.Sh SEE ALSO |
.Xr skeyinit 1 , |
.Xr skeyinit 1 , |
.Xr skeyinfo 1 |
.Xr skeyinfo 1 , |
|
.Em RFC1938 |
.Sh AUTHORS |
.Sh AUTHORS |
Phil Karn, Neil M. Haller, John S. Walden, Scott Chasin |
Phil Karn, Neil M. Haller, John S. Walden, Scott Chasin |