OTP alternatives and similar packages
Based on the "Cryptography" category.
Alternatively, view OTP alternatives based on common mentions on social networks and blogs.
-
pedersen-commitment
An implementation of Pedersen commitment schemes -
arithmetic-circuits
Arithmetic circuits for zero knowledge proof systems -
cryptohash
efficient and practical cryptohashing in haskell. DEPRECATED in favor of cryptonite -
ed25519
Minimal ed25519 Haskell package, binding to the ref10 SUPERCOP implementation. -
cipher-blowfish
DEPRECATED by cryptonite; A collection of cryptographic block and stream ciphers in haskell -
signable
Deterministic serialisation and signatures with proto-lens and protobuf-elixir support -
cipher-aes
DEPRECATED - use cryptonite - a comprehensive fast AES implementation for haskell that supports aesni and advanced cryptographic modes. -
crypto-api
Haskell generic interface (type classes) for cryptographic algorithms -
skein
Skein, a family of cryptographic hash functions. Includes Skein-MAC as well. -
galois-fft
Finite field polynomial arithmetic based on fast Fourier transforms -
crypto-pubkey
DEPRECATED - use cryptonite - Cryptographic public key related algorithms in haskell (RSA,DSA,DH,ElGamal) -
cipher-aes128
Based on cipher-aes, but using a crypto-api interface and providing resulting IVs for each mode -
crypto-numbers
DEPRECATED - use cryptonite - Cryptographic number related function and algorithms -
crypto-random
DEPRECATED - use cryptonite - Cryptographic random class and entropy gatherer with safe API for haskell
Collect and Analyze Billions of Data Points in Real Time
* Code Quality Rankings and insights are calculated and provided by Lumnify.
They vary from L1 to L5 with "L5" being the highest.
Do you think we are missing an alternative of OTP or a related project?
Popular Comparisons
README
OTP
: HMAC-Based and Time-Based One-Time Passwords (HOTP & TOTP)

Please refer to the package description for an overview of OTP
.
Usage examples
Generating one-time passwords
If you need to generate HOTP password described in RFC4226, then use
>>> hotp SHA1 "1234" 100 6
317569
>>> hotp SHA512 "1234" 100 6
134131
Or
>>> totp SHA1 "1234" (read "2010-10-10 00:01:00 UTC") 30 8
43388892
to generate TOTP password described in RFC6238.
Checking one-time passwords
hotpCheck :: HashAlgorithm -- ^ Hashing algorithm
-> Secret -- ^ Shared secret
-> (Word8, Word8) -- ^ how much counters to take lower and higher than ideal
-> Word64 -- ^ ideal (expected) counter value
-> Word8 -- ^ Number of digits in password
-> Word32 -- ^ Password entered by user
-> Bool -- ^ True if password acceptable
>>> hotpCheck SHA1 "1234" (0,0) 10 6 50897
True
>>> hotpCheck SHA1 "1234" (0,0) 9 6 50897
False
>>> hotpCheck SHA1 "1234" (0,1) 9 6 50897
True
Here almost the same aguments as for hotp
function, but there is
also (0, 0)
tuple. This tuple describes range of counters to check
in case of desynchronisation of counters between client and
server. I.e. if you specify (1, 1)
and ideal counter will be 10
then function will check passwords for [9, 10, 11]
list of
counters.
Here is the same for TOTP:
>>> totpCheck SHA1 "1234" (0, 0) (read "2010-10-10 00:00:00 UTC") 30 6 778374
True
>>> totpCheck SHA1 "1234" (0, 0) (read "2010-10-10 00:00:30 UTC") 30 6 778374
False
>>> totpCheck SHA1 "1234" (1, 0) (read "2010-10-10 00:00:30 UTC") 30 6 778374
True