Across
- 1. Practice of requiring two or more independent factors.
- 3. Time-based one-time password algorithm.
- 6. State value that advances to produce the next HOTP code.
- 8. Hardware security key used for HOTP+PIN and FIDO flows.
- 9. Counter-based HMAC one-time password algorithm.
- 10. USB class used for human-interface devices; referenced in your “named HID” TOTP context.
Down
- 2. The application that generates TOTP and is protected with FIDO.
- 4. Local secret on a security key used alongside HOTP validation.
- 5. Browser-facing W3C standard that implements FIDO authenticators.
- 7. Open authentication standards enabling phishing-resistant, passwordless login used in your implementation.
