About 408,000 results
Open links in new tab
  1. Is there an asymmetric TOTP algorithm that avoids sharing a private key ...

    Sep 5, 2024 · If you use public-key authentication, then you can ditch both passwords and TOTP altogether. Two common public-key solutions are TLS client certificate authentication (aka …

  2. GitHub - Emyrk/asymtotp: Asymmetric TOTP: https://emyrk.github

    This is a solution using an asymmetric key pair, meaning only the user needs the secret, and anyone with the public key can valid the OTP. The idea is to store the public key on an identity …

  3. Asymmetric Key Cryptography - GeeksforGeeks

    May 2, 2024 · Asymmetric-key cryptography uses mathematical functions to transform plaintext and ciphertext represented as numbers for encryption and decryption, while symmetric-key …

  4. One Time Password (OTP) algorithm in Cryptography

    Nov 6, 2023 · we’ll create a simple One Time Password (OTP) algorithm using Python’s built-in ‘secrets' module. The OTP algorithm will generate a random one-time password, which will be …

  5. public key infrastructure - TOTP: Storing symmetrical secrets ...

    Jun 5, 2016 · You can use asymmetric encryption to encrypt the TOTP keys which can then only be decrypted by the key residing on the HSM. Since TOTP seeds are short, you can just use …

  6. time-based encryption algorithm? - Stack Overflow

    Jul 10, 2012 · If you want your token to be time-based you can use TOTP algorithm. TOTP can help you generate a value for variable N (token) at a given time M. So the service requesting …

  7. Is there a way to create time based OTP with public/private key

    May 24, 2017 · In case you are talking about a One Time Password there is a simple reason, why TOTP-Algorithms are using a symmetric key on the client/device and the server side. If you …

  8. focus on authentication algorithms HOTP and TOTP as two algorithms for generating one-time passwords. A one-time password is an automatically generated string of characters - a …

  9. TOTP: How Most 2FA Apps Work | smarx.com

    Aug 18, 2020 · Asymmetric (or “public key”) cryptography would be better. In that model, the user generates a private key and shares the corresponding public key with the server at the time of …

  10. To solve the problem of shared symmetric key, Asymmetric cryptography was invented. This method replace a single shared key with a pair of keys, which are: composed of a public key …

  11. Some results have been removed
Refresh