Question: The Google Authenticator app implements two-step verification services for authenticating users of software applications. On set up, a user will be given a unique user-specific
The Google Authenticator app implements two-step verification services for authenticating users of software applications. On set up, a user will be given a unique user-specific secret key that is displayed as clear text on-screen. This secret key will be used to generate a time-based OTP for the user for all future logins. The timebased OTP is calculated using the SHA-1 hash function in the following manner: SHA-1(Current Time in UNIX timestamp || User-specific secret key) Criticise the security of this design and justify your answers. Propose a solution to overcome the flaw in the design. You will also be evaluated based on the clarity of your argument.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
