Algorithmic Approach to Secure Two-Factor Authentication Using Time-Based One-Time Passwords in Desktop Environments
DOI:
https://doi.org/10.59957/see.v10.i1.2025.3Keywords:
2FA, multi-factor authentication, TOTP, cryptography, computer security, cybersecurityAbstract
Time-Based One-Time Password (TOTP) systems are frequently utilized in modern security protocols in addition to two-factor authentication (2FA) because of their simplicity and strong security measures. Although many TOTP options target mobile devices, there is a noteworthy demand for solutions tailored to desktops systems because of factors such as user preferences, improved security measures, disaster recovery, and convenience for desktop-oriented tasks. This article presents a sophisticated algorithmic method for handling TOTP on desktop environments, meeting these requirements while upholding strict security and user friendliness criteria. The suggested method may guarantee the safe and easy creation of TOTP through the incorporation of complex algorithms and techniques, offering adaptability and strong disaster recovery measures. This approach boosts the connection with desktop security protocols, enhances usability for users without mobile devices, and simplifies the authentication process for those who mainly use desktop systems or laptop setups.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Science, Engineering and Education

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.