TOTP Generator
Generate time-based one-time passwords for two-factor authentication.
What Is TOTP?
TOTP (Time-based One-Time Password) is an algorithm defined in RFC 6238 that generates short-lived numeric codes based on a shared secret and the current time. TOTP is the standard behind apps like Google Authenticator, Authy, Microsoft Authenticator, and hardware tokens.
Each TOTP code is valid for a short window (typically 30 seconds) and then expires, making it extremely resistant to replay attacks. This is what powers the "6-digit code" step when you log in to services with two-factor authentication (2FA).
How TOTP Works
- A shared secret (Base32-encoded) is established between the server and your authenticator app, usually via a QR code.
- Both sides independently compute:
HMAC-SHA1(secret, floor(currentTime / 30)) - A 6-digit code is derived from the HMAC output using dynamic truncation.
- Since both sides use the same secret and the same clock, they produce the same code at the same time.
How to Use This Tool
- Enter your Base32 secret key (the same key your authenticator app uses).
- Click Generate to see the current TOTP code.
- The code refreshes every 30 seconds — generate again to get the latest code.
Common Use Cases
- Two-Factor Authentication (2FA): Add a second layer of security to logins beyond just a password.
- Development Testing: Verify your TOTP implementation generates correct codes.
- Account Recovery: If your authenticator app is unavailable, use the Base32 secret to generate codes.
- Server-Side Verification: Test that your server correctly validates TOTP codes during authentication flows.
TOTP Security Best Practices
- Store backup codes securely in case you lose access to your authenticator device.
- Keep the Base32 secret private — anyone with the secret can generate valid codes.
- Use TOTP over SMS-based 2FA — SMS codes are vulnerable to SIM-swapping attacks.
- Ensure clock synchronization — TOTP depends on accurate time; use NTP on your server.
Frequently Asked Questions
When you set up 2FA on a service, the setup page usually shows a QR code and an option to display
the secret key manually. That manual key is your Base32 secret. Save it in a secure location.
Yes. SMS codes can be intercepted via SIM-swapping, SS7 network vulnerabilities, or social engineering.
TOTP codes are generated locally on your device and never transmitted over a network, making them
significantly more secure.