<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=4&amp;t=1787" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2015-03-16T10:05:40+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=4&amp;t=1787</id>
<entry>
<author><name><![CDATA[Tom2]]></name></author>
<updated>2015-03-16T10:05:40+01:00</updated>
<published>2015-03-16T10:05:40+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1787&amp;p=7036#p7036</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1787&amp;p=7036#p7036"/>
<title type="html"><![CDATA[Re: Extracting PGP key material from a Yubikey Neo]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1787&amp;p=7036#p7036"><![CDATA[
The Yubikey NEO uses an NXP secure element a700x<br /><br />You can read the documentation about that chip and get an idea of how hard would be to extract keys from there. <br /><br /><!-- m --><a class="postlink" href="https://www.yubico.com/2014/04/improvements-physical-yubikey-attacks/">https://www.yubico.com/2014/04/improvem ... y-attacks/</a><!-- m --><p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3364">Tom2</a> — Mon Mar 16, 2015 10:05 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[grepular]]></name></author>
<updated>2015-03-15T11:43:08+01:00</updated>
<published>2015-03-15T11:43:08+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1787&amp;p=7032#p7032</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1787&amp;p=7032#p7032"/>
<title type="html"><![CDATA[Extracting PGP key material from a Yubikey Neo]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1787&amp;p=7032#p7032"><![CDATA[
I have a Yubikey Neo. I enabled the PGP applet. I have copied my existing keys across to it and it all works fine as a smart card.<br /><br />My question is this: If an attacker gets hold of my yubikey, how difficult would it be for them to extract my key material from it?<br /><br />I also have an OpenPGP v2 SmartCard and know that it was specifically designed to make extracting the key material very difficult. It would only be possible using an electron microscope and a lot of skill...<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3599">grepular</a> — Sun Mar 15, 2015 11:43 am</p><hr />
]]></content>
</entry>
</feed>