<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=4&amp;t=43" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2008-05-14T19:56:43+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=4&amp;t=43</id>
<entry>
<author><name><![CDATA[hrag]]></name></author>
<updated>2008-05-14T19:56:43+01:00</updated>
<published>2008-05-14T19:56:43+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=43&amp;p=47#p47</id>
<link href="https://forum.yubico.com/viewtopic.php?t=43&amp;p=47#p47"/>
<title type="html"><![CDATA[Since only a few bits of the token change from each...]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=43&amp;p=47#p47"><![CDATA[
Q: Since only a few bits of the token change from each authentication request - Could and an attacker could guess some of the plaintext if they knew the approximate current sequence number?<br /><br />A: We have a 16-bit random number and and a 16-bit CRC together with the counter- and timer fields. So there is a bit more stocastic means than just the counters themseleves.<br /><br />We have been thinking of increasing the random part to make the string less deterministic. It would be a very simple thing to do.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=58">hrag</a> — Wed May 14, 2008 7:56 pm</p><hr />
]]></content>
</entry>
</feed>