Ukraine flag

We stand with our friends and colleagues in Ukraine. To support Ukraine in their time of need visit this page

SHA-256 TOTP Hardware Tokens

Protectimus SHARK
A classic TOTP security token that fits on a keychain.
The Protectimus SHARK MFA token device generates time-based one-time passwords following the TOTP OATH standard, with added security thanks to support for the SHA-256 algorithm. These TOTP hardware tokens feature embedded secret keys that cannot be reprogrammed.

The Protectimus SHARK TOTP hardware token offers exceptional security features by supporting TOTP (RFC 6238) and SHA-256 algorithms, meeting OATH standards.

The key benefit of the Protectimus SHARK TOTP hardware token is its support for the superior SHA-256 algorithm, which offers stronger protection against brute force attacks.

It’s important to note that standalone use of the Protectimus SHARK TOTP hardware token is not possible. A third-party system is required to verify the value generated from the MFA token to complete authentication.

You can use Protectimus SHARK with Protectimus Cloud Service or On-Premise Platform, or with any other 2FA service that supports SHA256 TOTP tokens.

SHA-256 algorithm support

SHA-256 algorithm provides a stronger level of security compared to SHA-1. SHA-1 is an older algorithm that has been found to be vulnerable to attacks, while SHA-256 offers enhanced protection against brute force attacks. With Protectimus SHARK TOTP hardware token, your data and resources are kept secure with the latest and most reliable security technology available.

Drop-proof and moisture-resistant

The Protectimus SHARK 2FA token is designed to withstand harsh conditions, featuring robust construction and water resistance. The token is fully protected against dust and can operate even when submerged in water up to a depth of 1 meter. Its durable construction shields it from damage in the event of falls, ensuring longevity and reliability.

User-friendly design

The Protectimus SHARK MFA token device features an ergonomic design that is both stylish and functional. The token is designed to fit conveniently on a keyring, reducing the risk of losing it. With its compact size and sleek appearance, the Protectimus SHARK TOTP hardware token is a practical and attractive solution for two-factor authentication needs.

Specifications

  • Supported algorithms: TOTP (RFC 6238); SHA-256;
  • Compliance with OATH standards;
  • Secret keys: 32-character long (Base32);
  • Size: 28.62mm х 61.62mm х 8.9mm;
  • Weight: 16.1 g;
  • Display Type: LED, 6 digits with time indicator;
  • Dust and water resistance: IP67;
  • Possibility of branding for orders of 1000 pieces;
  • Warranty period: 12 months;
  • Battery charge indicator;
  • The 2FA token’s battery lasts up to 3-5 years.

Download

How to buy?

You can easily become a happy owner of this device. Depending on your preference, we can place your company’s logo and other visual features on the device; you can also choose the color of your token. Producing customized tokens based on your specific requirements takes additional 3-4 weeks.

The price of tokens does not include shipping and delivery costs and other additional charges, such as taxes and customs duties.

Delivery times depend on several factors, in particular: lot/consignment size, token availability at our warehouse, and postal service. Besides, the delivery time will depend on whether additional visual features need to be placed on the products. Typically, if there is a sufficient quantity of products at the warehouse, orders are delivered within 2 to 6 weeks.

To place an order, please fill out the form, and our specialist will promptly contact you.
Order

See also

ImageToken ModelPrice, pcs
110050010005000
Brief DescriptionDescription
PROTECTIMUS TWOPROTECTIMUS TWO$11.99$11.49$10.99$9.99$8.99

$3 when paying service in advance for a year
Bulletproof OTP token: reliable, waterproof, stylishBulletproof TOTP token: reliable, waterproof, stylish

$3 when paying service in advance for a year
PROTECTIMUS FLEXPROTECTIMUS FLEX$19.99$18.99$16.99$15.99$13.99The reprogrammable and stylish hardware TOTP tokenThe reprogrammable hardware TOTP token
PROTECTIMUS SHARKPROTECTIMUS SHARK$14.99$14.49$13.99$12.99$11.99This hardware token offers exceptional security features by supporting TOTP (RFC 6238) and SHA-256 algorithmWe recommend using this token
PROTECTIMUS SLIM MINIPROTECTIMUS SLIM MINI$29.99$28.99$26.99$24.99$21.99Reprogrammable NFC token, that fits any two-factor authentication systemReprogrammable NFC token
PROTECTIMUS SMARTPROTECTIMUS SMARTfreeAvailable for all key Android and iPhone platformsSoftware token for Android and iPhones
PROTECTIMUS SMARTPROTECTIMUS PUSHfreePush via Android and iPhone applicationsСonvenient and reliable
PROTECTIMUS BOTPROTECTIMUS BOTfreeOTP delivery via messenger — easy, secure, convenient. The service is available on Telegram, Viber and Facebook Messenger.The service is available on Telegram, Viber and Facebook Messenger
PROTECTIMUS SMSPROTECTIMUS SMS$2 per user/monthMinimum hassleMinimum hassle
PROTECTIMUS MAILPROTECTIMUS MAILfreeMinimum costsMinimum costs


Knowledge base

The SHA-256 algorithm offers superior security compared to SHA-1 due to several reasons. Firstly, it provides stronger collision resistance, making it more challenging for attackers to generate two different inputs that result in the same hash value. Secondly, SHA256 produces a longer 256-bit hash value, providing more security and making it more difficult for attackers to find a collision. Moreover, there are no known successful attacks against SHA256, whereas SHA1 has demonstrated weaknesses, including practical attacks that can produce collisions. As a result, the SHA256 algorithm is the recommended choice for cryptographic purposes and is ideal for use in TOTP security tokens.

The TOTP (Time-based One-Time Password) algorithm for two-factor authentication functions by merging a secret key with the present time to produce a one-time password (OTP). In Protectimus SHARK this password is generated using the SHA-256 hash function, which produces a fixed-length output of 256 bits. The use of SHA-256 makes the TOTP algorithm more secure and less susceptible to attacks, as it is a highly secure hash function that is widely used in various security protocols and applications. The OTP is only functional for a brief stretch of time, which is 30 seconds in the case of Protectimus SHARK, after which a new OTP is created. In order to configure TOTP authentication, it is vital for the device of the user and the authentication server to have the same secret key.

The classic TOTP hardware 2FA tokens come with secret keys that are pre-installed by the manufacturer and cannot be altered. When a user obtains their TOTP hardware token from a vendor, the secret key must be added to the authentication server, which may require the end-user or their system admin to be granted access to the validating server, which is not always feasible. Protectimus SHARK tokens are classic TOTP hardware tokens, you may use them with Protectimus two-factor authentication system or any other authentication system that supports OATH standards.

The Protectimus SHARK TOTP hardware token is an excellent choice for 2FA, providing exceptional security features by supporting TOTP (RFC 6238) and SHA-256 algorithms, meeting OATH standards. The most significant advantage of the Protectimus SHARK TOTP hardware token is its support for the superior SHA-256 algorithm, which provides better protection against cyber attacks.The Protectimus SHARK 2FA security token is an extremely dependable method of authentication. These TOTP hardware tokens function offline, making them impervious to hacking and interception of one-time passwords. Additionally, they have a robust construction and are waterproof, which ensures they have a lifespan of 3 to 5 years.

Why SHA-256 Algorithm Is Better Than SHA-1?


How does TOTP two-factor authentication algorithm work?


How to use classic TOTP hardware tokens?


Protectimus SHARK MFA Token Features