<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=26&amp;t=2144" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2016-01-14T14:54:41+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=26&amp;t=2144</id>
<entry>
<author><name><![CDATA[dain]]></name></author>
<updated>2016-01-14T13:44:15+01:00</updated>
<published>2016-01-14T13:44:15+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8174#p8174</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8174#p8174"/>
<title type="html"><![CDATA[Re: [Q?] Does the Yubikey 4 store the private-keys encrypted]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8174#p8174"><![CDATA[
<div class="quotetitle">codebase wrote:</div><div class="quotecontent"><br />In the FAQ of YubiHSM it says: <a href="https://www.yubico.com/products/yubihsm/#toggle-id-4" class="postlink">Are keys deleted on intrusion events?</a> Answer: Yes.<br />Does this also apply for the Yubikey 4?<br /></div><br /><br />The full answer on that page is &quot;Yes, the YubiHSM uses a secure element that is designed to destroy data in the case of an intrusion&quot;. I don't know the details on how this particular secure element deals with this, but the YubiKey 4 uses the same secure element as the YubiHSM, so I would assume so.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=504">dain</a> — Thu Jan 14, 2016 1:44 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[codebase]]></name></author>
<updated>2016-01-13T14:47:43+01:00</updated>
<published>2016-01-13T14:47:43+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8164#p8164</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8164#p8164"/>
<title type="html"><![CDATA[Re: [Q?] Does the Yubikey 4 store the private-keys encrypted]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8164#p8164"><![CDATA[
I think the YubiHSM (symmetric only) provides storing keys encrypted on the hardware. see FAQ: <!-- m --><a class="postlink" href="https://www.yubico.com/products/yubihsm/#toggle-id-3">https://www.yubico.com/products/yubihsm/#toggle-id-3</a><!-- m --><br /><div class="quotetitle"><b>Quote:</b></div><div class="quotecontent"><br />Yes, YubiHSM uses a secure element. In addition, the key store can be stored encrypted with AES-256 (passphrase needed on startup).<br /></div><br /><br /><br />In the FAQ of YubiHSM it says: <a href="https://www.yubico.com/products/yubihsm/#toggle-id-4" class="postlink">Are keys deleted on intrusion events?</a> Answer: Yes.<br />Does this also apply for the Yubikey 4?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4113">codebase</a> — Wed Jan 13, 2016 2:47 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[dain]]></name></author>
<updated>2016-01-13T14:01:12+01:00</updated>
<published>2016-01-13T14:01:12+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8160#p8160</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8160#p8160"/>
<title type="html"><![CDATA[Re: [Q?] Does the Yubikey 4 store the private-keys encrypted]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8160#p8160"><![CDATA[
<div class="quotetitle">codebase wrote:</div><div class="quotecontent"><br />I have an idea: When you are creating new keys in GnuPG, you are able to do a backup of the private-keys. When you choose to backup your private-keys in GnuPG, you are asked for a passphrase which protects the backup (so the backup of the private-keys is encrypted, even if it's stored in a secure location offline).<br /></div><br /><br />I don't think this really solves any of the issues. Anyway, it would require both firmware level changes and client software changes, and would break compatibility with the specification.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=504">dain</a> — Wed Jan 13, 2016 2:01 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[mouse008]]></name></author>
<updated>2016-01-13T03:44:10+01:00</updated>
<published>2016-01-13T03:44:10+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8158#p8158</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8158#p8158"/>
<title type="html"><![CDATA[Re: [Q?] Does the Yubikey 4 store the private-keys encrypted]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8158#p8158"><![CDATA[
<div class="quotetitle"><b>Quote:</b></div><div class="quotecontent"><br />It's just not practical to do what you're asking, and questionable if it would add any real security in practice.<br /></div><br />Agree 100%.<br /><br /><div class="quotetitle"><b>Quote:</b></div><div class="quotecontent"><br />I have an idea: ...<br /></div><br />How about establishing a startup that would manufacture hardware tokens with the capability you described - storing private keys encrypted in hardware, and requiring a complex passphrase (scrypt- or argon2-derived key) to decrypt them? Then we'll see (a) at what price point you'd be able to sell them, and (b) how much interest there is for this capability on the market. <br /><br />NSA, KGB, whoever, are you listening? <img src="https://forum.yubico.com/images/smilies/icon_e_smile.gif" alt=":-)" title="Smile" /><p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4029">mouse008</a> — Wed Jan 13, 2016 3:44 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[codebase]]></name></author>
<updated>2016-01-12T16:46:28+01:00</updated>
<published>2016-01-12T16:46:28+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8155#p8155</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8155#p8155"/>
<title type="html"><![CDATA[Re: [Q?] Does the Yubikey 4 store the private-keys encrypted]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8155#p8155"><![CDATA[
<div class="quotetitle">dain wrote:</div><div class="quotecontent"><br />It's just not practical to do what you're asking, and questionable if it would add any real security in practice.<br /></div> I have an idea: When you are creating new keys in GnuPG, you are able to do a backup of the private-keys. When you choose to backup your private-keys in GnuPG, you are asked for a passphrase which protects the backup (so the backup of the private-keys is encrypted, even if it's stored in a secure location offline).<br /><br />Now, if you want to export your existing GnuPG keys to your Yubikey: Instead of taking the actual plain-text-secret-key, you simply take the encrypted backup of the secret-key to export it to the Yubikey! So you end up with your secret-keys encrypted on the Yubikey. And when you are about to do crypto-operations you are required to input your PIN (aka. passphrase for your backup).<br /><br /><ul><li>Of course this would require change in code, but <strong>would this be possible?</strong></li><li><strong>Maybe without re-flashing the Yubikey firmware</strong>, e.g. by only changing software code on PC client side?</li></ul><br /><br /><br /><span style="font-size: 85%; line-height: normal">PS: Regarding &quot;lost PIN / passphrase&quot;: If you have a backup of your private-keys from GnuPG, you can always re-export these private-keys to your Yubikey! Maybe change the passphrase of your offline backup keys afterwards in GnuPG, so you can access them even if you forgot your Yubikey PIN (aka passphrase).</span><p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4113">codebase</a> — Tue Jan 12, 2016 4:46 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[dain]]></name></author>
<updated>2016-01-12T13:19:05+01:00</updated>
<published>2016-01-12T13:19:05+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8152#p8152</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8152#p8152"/>
<title type="html"><![CDATA[Re: [Q?] Does the Yubikey 4 store the private-keys encrypted]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8152#p8152"><![CDATA[
The security of the keys lies in the secure element itself. That's the very purpose of the chip, so I would say that yes, it is reasonable to store private-key material in such hardware.<br /><br />Encrypting the keys using the PIN would be troublesome for a few reasons: First off, if you forget your PIN you can reset it using the Reset Code or the Admin PIN. You'd then be left with encrypted private keys and no knowledge of the key. To avoid this you could encrypt using each of these three PINs, so that any one of them can be used to decrypt. The problem then becomes that you would need to enter all codes when generating/importing a new key, to be able to do this encryption. This would not be compatibly with the OpenPGP card standard, so key management would require a separate client.<br /><br />For this to give any real protection you would need a lot of entropy in each of the three PINs. Surely an adversary capable of extracting the keys from the chip would be able to spend some effort bruteforcing the encryption as well. Sure, you could use a key strengthening algorithm like PBKDF2 or scrypt, but again, this would be non-standard and require a specialized client which does this (so say goodbye to gpg).<br /><br />It's just not practical to do what you're asking, and questionable if it would add any real security in practice.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=504">dain</a> — Tue Jan 12, 2016 1:19 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[codebase]]></name></author>
<updated>2016-01-11T23:38:18+01:00</updated>
<published>2016-01-11T23:38:18+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8147#p8147</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8147#p8147"/>
<title type="html"><![CDATA[Re: [Q?] Does the Yubikey 4 store the private-keys encrypted]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8147#p8147"><![CDATA[
<div class="quotetitle">Uriel wrote:</div><div class="quotecontent"><br /><div class="quotetitle"><b>Quote:</b></div><div class="quotecontent">... So IF you loose your Yubikey for whatever reason ...<br /></div><br />Ever heard of key revocation?</div><br />Does key revocation justify, keeping the private-keys in plain-text on the device? interessting  <img src="https://forum.yubico.com/images/smilies/icon_rolleyes.gif" alt=":roll:" title="Rolling Eyes" /><br /><br /><br />Don't get me wrong, I'm pretty happy with my Yubikey 4 and I will keep using it; though I'm still shocked how you can keep the private-keys in plain-text when you are able to offer so many other features with this tiny piece of hardware.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4113">codebase</a> — Mon Jan 11, 2016 11:38 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Uriel]]></name></author>
<updated>2016-01-11T20:38:44+01:00</updated>
<published>2016-01-11T20:38:44+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8145#p8145</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8145#p8145"/>
<title type="html"><![CDATA[Re: [Q?] Does the Yubikey 4 store the private-keys encrypted]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8145#p8145"><![CDATA[
<div class="quotetitle"><b>Quote:</b></div><div class="quotecontent"><br />... So IF you loose your Yubikey for whatever reason ...<br /></div><br />Ever heard of key revocation?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3568">Uriel</a> — Mon Jan 11, 2016 8:38 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[codebase]]></name></author>
<updated>2016-01-11T23:46:06+01:00</updated>
<published>2016-01-10T19:27:54+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8139#p8139</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8139#p8139"/>
<title type="html"><![CDATA[Re: [Q?] Does the Yubikey 4 store the private-keys encrypted]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8139#p8139"><![CDATA[
<div class="quotetitle">mouse008 wrote:</div><div class="quotecontent"><br />I don't think any current smartcards store keys encrypted. If your threat model includes adversary capable of extracting private keys from silicon, you have bigger problems than a $40 device is likely to address.<br /></div><br />Give me 1 reason why you are not using the user's PIN (1-256 character, digits, letters) to encrypt the private-keys on the silicon? It has nothing to do with threat-models at all, it's just common sense.<br /><br /><br />... So IF you loose your Yubikey for whatever reason ... you come home ... and lay in bed ... and know exactely as your thoughts are circling ... &quot;Oh Dear. All the private-key material is stored there in plain text with no additional cryptographic protection at all.&quot; Then you are beginning to worry my friend, because then you are pretty f* up cause <strong><span style="text-decoration: underline">you just lost your private-keys</span></strong>, like a 12 year old school kid just lost his lunch and milky money. And guess what ... it has nothing to do with any conspiracy theory or three-letter-agency ... <strong><span style="color: #FF0000">it's just not reasonable to store private-key material in plain-text on the hardware</span></strong>.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4113">codebase</a> — Sun Jan 10, 2016 7:27 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[cobaltjacket]]></name></author>
<updated>2016-01-08T04:22:24+01:00</updated>
<published>2016-01-08T04:22:24+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8129#p8129</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8129#p8129"/>
<title type="html"><![CDATA[Re: [Q?] Does the Yubikey 4 store the private-keys encrypted]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8129#p8129"><![CDATA[
<div class="quotetitle">mouse008 wrote:</div><div class="quotecontent"><br />I don't think any current smartcards store keys encrypted. If your threat model includes adversary capable of extracting private keys from silicon, you have bigger problems than a $40 device is likely to address.<br /></div><br /><br />That reminds me of the Mickens paper:<br /><div class="quotetitle"><b>Quote:</b></div><div class="quotecontent"><br />Basically, you're either dealing with Mossad or not-Mossad. If your adversary is not-Mossad, then you'll probably be fine if you pick a good password and don't respond to emails from <!-- e --><a href="mailto:ChEaPestPAiNPi11s@virus-basket.biz.ru">ChEaPestPAiNPi11s@virus-basket.biz.ru</a><!-- e -->. If your adversary is the Mossad, YOU'RE GONNA DIE AND THERE'S NOTHING THAT YOU CAN DO ABOUT IT.<br /></div><br /><br /><a href="https://www.schneier.com/blog/archives/2015/08/mickens_on_secu.html" class="postlink">https://www.schneier.com/blog/archives/2015/08/mickens_on_secu.html</a><p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3909">cobaltjacket</a> — Fri Jan 08, 2016 4:22 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[mouse008]]></name></author>
<updated>2016-01-08T01:54:58+01:00</updated>
<published>2016-01-08T01:54:58+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8128#p8128</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8128#p8128"/>
<title type="html"><![CDATA[Re: [Q?] Does the Yubikey 4 store the private-keys encrypted]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8128#p8128"><![CDATA[
I don't think any current smartcards store keys encrypted. If your threat model includes adversary capable of extracting private keys from silicon, you have bigger problems than a $40 device is likely to address.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4029">mouse008</a> — Fri Jan 08, 2016 1:54 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[codebase]]></name></author>
<updated>2016-01-14T14:54:41+01:00</updated>
<published>2016-01-03T21:35:01+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8106#p8106</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8106#p8106"/>
<title type="html"><![CDATA[[SOLVED]Does the Yubikey 4 store the private-keys encrypted?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2144&amp;p=8106#p8106"><![CDATA[
Hello,<br /><br />does the Yubikey 4 store the GnuPG (GPG) private-keys on the Yubikey 4 encrypted on the silicon?<br /><br /><br />Regards,<br />Codebase<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4113">codebase</a> — Sun Jan 03, 2016 9:35 pm</p><hr />
]]></content>
</entry>
</feed>