<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=16&amp;t=68" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2009-09-18T22:18:44+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=16&amp;t=68</id>
<entry>
<author><name><![CDATA[RtFM]]></name></author>
<updated>2009-09-18T22:18:44+01:00</updated>
<published>2009-09-18T22:18:44+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=68&amp;p=1789#p1789</id>
<link href="https://forum.yubico.com/viewtopic.php?t=68&amp;p=1789#p1789"/>
<title type="html"><![CDATA[Re: assymetric keys]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=68&amp;p=1789#p1789"><![CDATA[
you guys are over thinking it all you have to do is pass an encrypted string into the assykey have it decrypt it and then pass the value back to the server. you dont need the key sig because the key should only have one inside of it. no counters no timers just a way to do the decryption on the key and a way of getting the data into the key because you can also use the yubikey 2.0 design for getting the public key and the decrypted string out of the assykey.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=880">RtFM</a> — Fri Sep 18, 2009 10:18 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[dholth]]></name></author>
<updated>2009-08-11T22:27:48+01:00</updated>
<published>2009-08-11T22:27:48+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=68&amp;p=1664#p1664</id>
<link href="https://forum.yubico.com/viewtopic.php?t=68&amp;p=1664#p1664"/>
<title type="html"><![CDATA[Re: asymmetric keys]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=68&amp;p=1664#p1664"><![CDATA[
Yubikey needs a central authority to prevent replay attacks with or without asymmetric encryption. The Yubikey encrypts a monotonically increasing counter and checks to make sure it's higher than any previously seen counters. Without the central authority the OTP you send to server A will be accepted by servers B, C, and D, no matter what kind of encryption is used.<br /><br />Instead of having to worry about the integrity of a single authentication server you now have to worry about the N servers you log into, your computer, and the channel between them, your OTP is 20 times longer, and your key is more expensive.<br /><br />If you want to take away the central party then you should go buy a smart card and then try to set up its reader and drivers on each system you use. Smart cards generate a public and private key internally, they can only reveal the public key, and they use their private key to sign a challenge received from the server.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=786">dholth</a> — Tue Aug 11, 2009 10:27 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[hacho]]></name></author>
<updated>2009-04-22T03:50:22+01:00</updated>
<published>2009-04-22T03:50:22+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=68&amp;p=1406#p1406</id>
<link href="https://forum.yubico.com/viewtopic.php?t=68&amp;p=1406#p1406"/>
<title type="html"><![CDATA[Re: assymetric keys]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=68&amp;p=1406#p1406"><![CDATA[
I completely agree with mtiller.<br />What about the idea that Simon posted? The output is only 64 bytes, which can be encoded to 90 characters. This is only 2x of the current output.<br /><br />What I don't quite understand is what would be the input to encrypt.<br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">$ openssl genrsa -out rsa.pem<br />Generating RSA private key, 512 bit long modulus<br />..........++++++++++++<br />.++++++++++++<br />unable to write 'random state'<br />e is 65537 (0x10001)<br />$ echo 'this is a new hash' | openssl rsautl -encrypt -inkey rsa.pem | openssl enc -base64 -out hash-b64.out<br />$ wc -c hash-b64.out <br />90 hash-b64.out<br />$ cat hash-b64.out <br />IsXIx0rnI/qvsAAw5ZpyrgibEtlg3Mii0jq5Rf1nsRleCYBCBpDxIKU7OoPxBZ+n<br />Xxq0xnZNpU34Z5j01TEk4Q==<br /></div><p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=576">hacho</a> — Wed Apr 22, 2009 3:50 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[mtiller]]></name></author>
<updated>2008-07-08T15:20:15+01:00</updated>
<published>2008-07-08T15:20:15+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=68&amp;p=420#p420</id>
<link href="https://forum.yubico.com/viewtopic.php?t=68&amp;p=420#p420"/>
<title type="html"><![CDATA[Re: assymetric keys]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=68&amp;p=420#p420"><![CDATA[
I got a Yubikey because I loved the principle of a hardware token with open source infrastructure.  But after contemplating it for a while I came to the conclusion that symmetric keys are a significant weakness (for reasons already pointed out in this thread).  I just wanted to add my &quot;2 cents&quot; by saying that I think assymetric keys would help address what I see as the single biggest weakness of the Yubikey.  I'd love to see a second generation device that uses public/private key pairs.<br /><br />I'd like to see this discussion continue in the hope that somebody comes up with a clever idea for addressing some of the issues brought up so far (e.g. reducing the size of the encrypted blob, etc).<br /><br />P.S. - Regarding clock drift, I was wonder if they clock couldn't be resyncronized?  While it is true that the Yubikey should be able to operate without requiring any software to be installed but of course a user could optionally install software that resync'd the Yubikey (as a performance improvement, for example).<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=199">mtiller</a> — Tue Jul 08, 2008 3:20 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Simon]]></name></author>
<updated>2008-06-02T08:45:29+01:00</updated>
<published>2008-06-02T08:45:29+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=68&amp;p=143#p143</id>
<link href="https://forum.yubico.com/viewtopic.php?t=68&amp;p=143#p143"/>
<title type="html"><![CDATA[Re: assymetric keys]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=68&amp;p=143#p143"><![CDATA[
If you look at just PKCS#1 RSA encrypt/sign, I believe the output will be as long as the modulus size.  Thus, a 2048 bit key (which is the minimum you want to use to be safe) would be 256 bytes, or 512 modhex characters.  Right now the output is 44 modhex characters and it is getting on the long side.<br /><br />There is ECC though, which has significant shorter signatures.<br /><br />/Simon<br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">jas@mocca:~$ openssl genrsa -out rsa.pem<br />Generating RSA private key, 512 bit long modulus<br />.++++++++++++<br />.++++++++++++<br />e is 65537 (0x10001)<br />jas@mocca:~$ cat rsa.pem<br />-----BEGIN RSA PRIVATE KEY-----<br />MIIBPAIBAAJBAMJ8JDWnjv/qfvVwv5A6Sm3MyVp59L5RhW8JCOTBYy2yZKa1CeVE<br />jaJQotpoI4AZ7j+y9Z23bw/a7OFHo3G08MsCAwEAAQJBAI/aOQJCxOAAOBYdZmQs<br />6X6budelW2UmcVb2zNA/Rre17wwKHpB7RQkchf4Tyc0z2cCXffINi72fWpOw58jj<br />TVkCIQD4OGywdOzgQLRclVHRq9a685UwW5AYe9JS2N4LwXdytwIhAMiUkyW1InZj<br />MRrqFGHTWG43RqCa2hqFYMzB4DwOwU6NAiEA9Mvo3SmjRxJpDfmxJGAdOGjrlDJo<br />7MyIw23fpqZZYAcCIAhfq4T3eujWW0Z0X0V2PUrco+YwkMpqpw/lSCc5tnhBAiEA<br />3QMqy4qSjSgn4LQdxDWMpFj/kjSMwinD+i9BeEgv7iY=<br />-----END RSA PRIVATE KEY-----<br />jas@mocca:~$ echo 'hi'|openssl rsautl -encrypt -inkey rsa.pem  -out foo.out<br />jas@mocca:~$ ls -la foo.out <br />-rw-r--r-- 1 jas jas 64 2008-06-02 09:43 foo.out<br />jas@mocca:~$ <br /></div><p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2">Simon</a> — Mon Jun 02, 2008 8:45 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[metamind]]></name></author>
<updated>2008-05-30T08:02:10+01:00</updated>
<published>2008-05-30T08:02:10+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=68&amp;p=122#p122</id>
<link href="https://forum.yubico.com/viewtopic.php?t=68&amp;p=122#p122"/>
<title type="html"><![CDATA[Re: assymetric keys]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=68&amp;p=122#p122"><![CDATA[
The above scenario won't work by the way. The public key can't decrypt a hash of the encrypted data. It can only decrypt unaltered data.<br /><br />How big would the output of a 10 character string be that has been encrypted with a long private key?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=86">metamind</a> — Fri May 30, 2008 8:02 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[metamind]]></name></author>
<updated>2008-05-29T23:24:09+01:00</updated>
<published>2008-05-29T23:24:09+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=68&amp;p=121#p121</id>
<link href="https://forum.yubico.com/viewtopic.php?t=68&amp;p=121#p121"/>
<title type="html"><![CDATA[Re: assymetric keys]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=68&amp;p=121#p121"><![CDATA[
regarding drift: you would store the &quot;Local key time&quot; with the user profile and the drift window would only be relative to the time of the last logon. So if the user hasn't logged on for a whole year the drift window would be &quot;only&quot; 106 minutes. If they log on each week the window would only be +-1 min.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=86">metamind</a> — Thu May 29, 2008 11:24 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Jakob]]></name></author>
<updated>2008-05-29T23:00:26+01:00</updated>
<published>2008-05-29T23:00:26+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=68&amp;p=120#p120</id>
<link href="https://forum.yubico.com/viewtopic.php?t=68&amp;p=120#p120"/>
<title type="html"><![CDATA[Re: assymetric keys]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=68&amp;p=120#p120"><![CDATA[
It sounds like you are refering to something more like an asymmetric version of the SecureID, Vasco et.al. , is that right ?<br /><br />- The variant part would then be a timer, with say one minute resolution<br />- The &quot;blob&quot; would be encrypted with RSA-2048 or so<br />- Then hash the stuff with SHA-1 or so, reducing it to 160 bits. A shorter hash would do as well of course...<br />- Convert it to 40 characters<br /><br />That would be nice of course and it's definately worth keeping in mind. <br /><br />Matching the OTPs would be considerably more complex, given that you would have to try over a fairly wide time window. A low-cost crystal varies at least some +/-100 ppm and given that we have about 526,000 minutes on a year that would be some +/- 53 minutes drift.<br /><br />Maybe there is some other way to do it.<br /><br />Regarding the Yubico server being a specific target for bad guys, that's a point. But there are so many services relying on symmetric keys, I beleive most people would agree there are ways to maintain and store these keys in a secure way. It is furthermore important to say that we won't be the single point of attack. Things will grow and lots of sites will maintain their own keys. It's going to be distributed, just like password databases.<br /><br />Regards,<br /><br />          J<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=83">Jakob</a> — Thu May 29, 2008 11:00 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[metamind]]></name></author>
<updated>2008-05-29T21:40:25+01:00</updated>
<published>2008-05-29T21:40:25+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=68&amp;p=115#p115</id>
<link href="https://forum.yubico.com/viewtopic.php?t=68&amp;p=115#p115"/>
<title type="html"><![CDATA[Re: assymetric keys]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=68&amp;p=115#p115"><![CDATA[
I was thinking of making the otp an encrypted digest of the time (see my other forum thread) so the otp need not be all that long. only the &quot;public&quot; key could decrypt it ensuring that it was really &quot;The Key&quot; that encrypted the otp. This would mean that your customers could &quot;publish&quot; the public key to all the services that use the key for authentication and <br /><br />i. there is no need for a central authorising party (so offline validation works)<br />ii. there is not the issue of the risk of the key repository getting compromised<br /><br />You are going to become a very high value target for hackers / foreign government agencies with all those secrets you hold.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=86">metamind</a> — Thu May 29, 2008 9:40 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Jakob]]></name></author>
<updated>2008-05-29T19:44:34+01:00</updated>
<published>2008-05-29T19:44:34+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=68&amp;p=103#p103</id>
<link href="https://forum.yubico.com/viewtopic.php?t=68&amp;p=103#p103"/>
<title type="html"><![CDATA[Re: assymetric keys]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=68&amp;p=103#p103"><![CDATA[
The question has been up a few times and conceptually it would have been nice.<br /><br />There are two main problems as I see it<br /><br />a) The hardware required to do an asymmetric encryption is a magnitude more complex than the one we have now. We would need a serious bignum engine on board and we beleive that would make the product significantly more expensive<br /><br />b) Anything less than 2048 bits signatures would not impress. That OTP would be *very* long to send in via the keyboard port. Given that some 20 keystrokes per second can be safely sent, this will take a bit too long time to execute.<br /><br />Bottom line: Not now, but we might find out some nice compromise as time gets by.<br /><br />Regards,<br /><br />Jakob E<br />Firmware and Hardware guy @ Yubico<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=83">Jakob</a> — Thu May 29, 2008 7:44 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[metamind]]></name></author>
<updated>2008-05-29T09:52:24+01:00</updated>
<published>2008-05-29T09:52:24+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=68&amp;p=101#p101</id>
<link href="https://forum.yubico.com/viewtopic.php?t=68&amp;p=101#p101"/>
<title type="html"><![CDATA[assymetric keys]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=68&amp;p=101#p101"><![CDATA[
Hi,<br /><br />Do you have any plans to produce a yubikey that uses assymetric keys to encrypt the token?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=86">metamind</a> — Thu May 29, 2008 9:52 am</p><hr />
]]></content>
</entry>
</feed>