From ef07096f3893193a84f9d20ca90ad9877921531d Mon Sep 17 00:00:00 2001 From: Joel Coutinho Date: Wed, 27 Mar 2024 11:44:00 +0530 Subject: [PATCH] updates otp vs totp vs hotp blog --- content/otp-vs-totp-vs-hotp/index.md | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/content/otp-vs-totp-vs-hotp/index.md b/content/otp-vs-totp-vs-hotp/index.md index 1ebe55e1..5649f0dc 100644 --- a/content/otp-vs-totp-vs-hotp/index.md +++ b/content/otp-vs-totp-vs-hotp/index.md @@ -7,6 +7,15 @@ category: "programming" author: "Sara Mashfej" --- +## Table of Content +- [Introduction](#introduction) +- [Understanding Multi-factor authentication and OTP](#understanding-multi-factor-authentication-and-otp) +- [One Time Passwords (OTP)](#one-time-passwords-otp) +- [Time based One Time Password (TOTP)](#totp) +- [HMAC-based One-time Password (HOTP)](#hotp) +- [TOTP vs HOTP](#totp-vs-hotp) +- [Conclusion](#conclusion) + ## Introduction Traditional username and password authentication methods have historically served as the default choice for ensuring secure access. However, [nearly half (49%) of incidents](https://www.verizon.com/business/en-gb/resources/reports/dbir/) cited in Verizon's 2023 Data Breach Investigations Report involved compromised passwords.