• @nucleative
    link
    English
    510 hours ago

    The TOTP changes every time. For modern totp hashing I’m not sure how many sequential codes a keylogger would need but I’m guessing more than I will ever enter.

    Edit, asked ai for an answer to that because I was curious (maybe it’s right):

    Start AI

    That being said, if an attacker were able to collect a large number of TOTP codes, they might be able to launch a brute-force attack to try to guess the private key. However, this would require an enormous amount of computational power and time.

    To give you an idea of the scale, let’s consider the following:

    Assume an attacker collects 1000 TOTP codes, each 6 digits long (a common length for TOTP codes).
    Assume the private key is 128 bits long (a common length for cryptographic keys).
    Assume the attacker uses a powerful computer that can perform 1 billion computations per second.
    

    Using a brute-force attack, the attacker would need to try approximately 2^128 (3.4 x 10^38) possible private keys to guess the correct one. Even with a powerful computer, this would take an enormous amount of time - on the order of billions of years.