Security Concerns in an Inventory TOTP Scheme using Time-Variant Keys
Assume we chose to change the secret key in HMAC generation for TOTP, every second.
How can we authenticate to such a scheme assuming a 32 byte key is randomly generated passing posix time to srand() for seeding and calling… Continue reading Security Concerns in an Inventory TOTP Scheme using Time-Variant Keys