Security Model and Definitions
Core authentication terminology and implementation boundaries used by TOTPBOX.
Last updated: March 19, 2026
Author: Perry Lei
Reviewed: March 21, 2026 by TOTPBOX Security Review
TOTPBOX is designed for high-assurance authentication workflows: local encryption first, minimal secret exposure, and staged migration toward Passkeys.
1. What is TOTP?
TOTP (Time-based One-Time Password, RFC 6238) generates a short code from a shared secret and a moving time step (typically 30 seconds). The code changes every interval and can be verified server-side with synchronized time.
Operational implications
- Anyone with the secret can generate valid codes
- Clock skew and code timing affect reliability
- TOTP is better than SMS but remains phishable in many flows
2. What is HOTP?
HOTP (HMAC-based One-Time Password, RFC 4226) derives codes from a secret and incrementing counter. Unlike TOTP, validity depends on counter synchronization, not wall-clock time.
3. What are Passkeys?
Passkeys are public-key credentials built on WebAuthn/FIDO2. Private keys stay on user devices and authentication uses challenge-response cryptography, which significantly reduces phishing risk compared with shared-secret OTP methods.
4. Local-first boundary
- Sensitive records are encrypted client-side before any sync
- Master keys are not transmitted to backend services
- Service-side systems operate on ciphertext for vault content
- Passkey credential material remains under platform credential management
5. Encryption model
Vault records use AES-256-GCM for confidentiality and integrity. Authenticated encryption protects against silent ciphertext tampering and rejects modified payloads at decrypt time.
6. Residual risks
No software tool eliminates all account risk. Endpoint compromise, phishing of fallback channels, and poor recovery hygiene can still result in account loss or unauthorized access.
The migration goal is to minimize these residual risks through better credential types, tighter recovery handling, and explicit account ownership controls.
7. Standards and source references
Definitions and security terminology on this page are anchored to public standards and security guidance: