Implementing 2FA: How Time-Based One-Time Password Actually Works [With Python Examples]by@luizguilhermefr
5,137 reads
5,137 reads

Implementing 2FA: How Time-Based One-Time Password Actually Works [With Python Examples]

by Luiz Rosa4mJuly 6th, 2020
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Implementing 2FA: How Time-Based One-Time Password Actually Works [With Python Examples] The most popular 2FA method today is to use an authenticator app on your cellphone to generate a temporary password that expires within a minute or less. The TOTP algorithm is defined on the IETF RFC 6238, where it says the shared key "should be chosen at random or using a cryptographically strong pseudorandom generator properly seeded with a random value" It consists of issuing a secret key on your server and reading it on your phone, then using this secret key to generate passwords.

Company Mentioned

Mention Thumbnail
featured image - Implementing 2FA: How Time-Based One-Time Password Actually Works [With Python Examples]
Luiz Rosa HackerNoon profile picture
Luiz Rosa

Luiz Rosa

@luizguilhermefr

Computer Scientist, Software Engineer @ Loadsmart, Machine Learning enthusiast

Learn More
LEARN MORE ABOUT @LUIZGUILHERMEFR'S
EXPERTISE AND PLACE ON THE INTERNET.

Share Your Thoughts

About Author

Luiz Rosa HackerNoon profile picture
Luiz Rosa@luizguilhermefr
Computer Scientist, Software Engineer @ Loadsmart, Machine Learning enthusiast

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
L O A D I N G
. . . comments & more!