Loading AI tools
Two-step verification app From Wikipedia, the free encyclopedia
Google Authenticator is a software-based authenticator by Google. It implements multi-factor authentication services using the time-based one-time password (TOTP; specified in RFC 6238) and HMAC-based one-time password (HOTP; specified in RFC 4226), for authenticating users of software applications.[5]
Developer(s) | |||||
---|---|---|---|---|---|
Initial release | September 20, 2010[1] | ||||
Stable release(s) [±] | |||||
| |||||
Repository | github | ||||
Written in |
| ||||
Operating system | Android, iOS, BlackBerry OS, Wear OS | ||||
Platform | Mobile | ||||
License | Proprietary freeware (some versions were under Apache License 2.0) |
When logging into a site supporting Authenticator (including Google services) or using Authenticator-supporting third-party applications such as password managers or file hosting services, Authenticator generates a six- to eight-digit one-time password which users must enter in addition to their usual login details.
Google provides Android,[6] Wear OS,[7] BlackBerry, and iOS[8] versions of Authenticator.
An official open-source fork of the Android app is available on GitHub.[9] However, this fork was archived in Apr 6, 2021 and is now read only.[10]
Current software releases are proprietary freeware.[11]
The app is first installed on a smartphone to use Authenticator. It must be set up for each site with which it is to be used: the site provides a shared secret key to the user over a secure channel, to be stored in the Authenticator app. This secret key will be used for all future logins to the site.
To log into a site or service that uses two-factor authentication and supports Authenticator, the user provides a username and password to the site. The site then computes (but does not display) the required six-digit one-time password and asks the user to enter it. The user runs the Authenticator app, which independently computes and displays the same password, which the user types in, authenticating their identity.[citation needed]
With this kind of two-factor authentication, mere knowledge of username and password is insufficient to break into a user's account - the attacker also needs knowledge of the shared secret key or physical access to the device running the Authenticator app. An alternative route of attack is a man-in-the-middle attack: if the device used for the login process is compromised by malware, the credentials and one-time password can be intercepted by the malware, which then can initiate its login session to the site, or monitor and modify the communication between the user and the site.[12]
During setup, the service provider generates an 80-bit secret key for each user (whereas RFC 4226 §4 requires 128 bits and recommends 160 bits).[13] This is transferred to the Authenticator app as a 16, 26, or 32-character base32 string, or as a QR code.
Subsequently, when the user opens the Authenticator app, it calculates an HMAC-SHA1 hash value using this secret key. The message can be:
A portion of the HMAC is extracted and displayed to the user as a six-digit code; The last nibble (4 bits) of the result is used as a pointer, to a 32-bit integer, in the result byte array, and masks out the 31st bit.
The Google Authenticator app for Android was originally open source, but later became proprietary.[11] Google made earlier source for their Authenticator app available on its GitHub repository; the associated development page stated:
"This open source project allows you to download the code that powered version 2.21 of the application. Subsequent versions contain Google-specific workflows that are not part of the project."[14]
The latest open-source release was in 2020.[9]
Seamless Wikipedia browsing. On steroids.
Every time you click a link to Wikipedia, Wiktionary or Wikiquote in your browser's search results, it will show the modern Wikiwand interface.
Wikiwand extension is a five stars, simple, with minimum permission required to keep your browsing private, safe and transparent.