Question: The Google Authenticator app implements two-step verification services for authenticating users of software applications. On set up, a user will be given a unique user-specific

The Google Authenticator app implements two-step verification services for authenticating users of software applications. On set up, a user will be given a unique user-specific secret key that is displayed as clear text on-screen. This secret key will be used to generate a time-based OTP for the user for all future logins. The timebased OTP is calculated using the SHA-1 hash function in the following manner: SHA-1(Current Time in UNIX timestamp || User-specific secret key) Criticise the security of this design and justify your answers. Propose a solution to overcome the flaw in the design. You will also be evaluated based on the clarity of your argument.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Finance Questions!