<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=16&amp;t=782" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2012-04-08T08:52:11+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=16&amp;t=782</id>
<entry>
<author><name><![CDATA[andlil]]></name></author>
<updated>2012-04-08T08:52:11+01:00</updated>
<published>2012-04-08T08:52:11+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=782&amp;p=2994#p2994</id>
<link href="https://forum.yubico.com/viewtopic.php?t=782&amp;p=2994#p2994"/>
<title type="html"><![CDATA[Re: Storing more than 6bytes worth of private data?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=782&amp;p=2994#p2994"><![CDATA[
<div class="quotetitle">dbp wrote:</div><div class="quotecontent"><br /><div class="quotetitle">andlil wrote:</div><div class="quotecontent">Yes, you could program a static password <a href="http://www.yubico.com/static-password" class="postlink">http://www.yubico.com/static-password</a><br /></div><br /><br />Doing that would be vulnerable to replay attacks, which would be definitely non-optimal. I would like to retain the security of OTPs, but just deliver a slightly larger payload.</div><br /><br />How about OTP in slot 1, to mitigate replay attacks, and a static password/encryption key in  slot 2?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=805">andlil</a> — Sun Apr 08, 2012 8:52 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[dbp]]></name></author>
<updated>2012-04-07T16:44:17+01:00</updated>
<published>2012-04-07T16:44:17+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=782&amp;p=2993#p2993</id>
<link href="https://forum.yubico.com/viewtopic.php?t=782&amp;p=2993#p2993"/>
<title type="html"><![CDATA[Re: Storing more than 6bytes worth of private data?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=782&amp;p=2993#p2993"><![CDATA[
<div class="quotetitle">andlil wrote:</div><div class="quotecontent"><br />Yes, you could program a static password <a href="http://www.yubico.com/static-password" class="postlink">http://www.yubico.com/static-password</a><br /></div><br /><br />Doing that would be vulnerable to replay attacks, which would be definitely non-optimal. I would like to retain the security of OTPs, but just deliver a slightly larger payload.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2011">dbp</a> — Sat Apr 07, 2012 4:44 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[andlil]]></name></author>
<updated>2012-04-07T08:33:57+01:00</updated>
<published>2012-04-07T08:33:57+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=782&amp;p=2992#p2992</id>
<link href="https://forum.yubico.com/viewtopic.php?t=782&amp;p=2992#p2992"/>
<title type="html"><![CDATA[Re: Storing more than 6bytes worth of private data?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=782&amp;p=2992#p2992"><![CDATA[
Yes, you could program a static password <a href="http://www.yubico.com/static-password" class="postlink">http://www.yubico.com/static-password</a><p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=805">andlil</a> — Sat Apr 07, 2012 8:33 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[dbp]]></name></author>
<updated>2012-04-06T20:07:59+01:00</updated>
<published>2012-04-06T20:07:59+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=782&amp;p=2991#p2991</id>
<link href="https://forum.yubico.com/viewtopic.php?t=782&amp;p=2991#p2991"/>
<title type="html"><![CDATA[Storing more than 6bytes worth of private data?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=782&amp;p=2991#p2991"><![CDATA[
I would like to use the yubikey as a way to both authenticating and decrypting resources on a remote system - so the authentication is handled by the normal OTP functionality, but I would also like to be able to include a decryption key not know by the server. <br /><br />But the only private payload that I can send (as far as I can tell) is the private &quot;ID&quot;. 6 bytes is 48 bits, which is a little small for an encryption key. So my question is, is there any way of storing more private data? Like can I somehow fix the 16bit random number to be a known constant, yielding 64 bits total (which is still small, but might be enough, at least as a proof of concept).<br /><br />Anyway, I know this is not exactly what the yubikey is designed for, but I think it could have real potential - as more and more computation is done via the web, the inherent problem of permanently storing decryption keys serverside (or not encrypting data at all, as it is basically equivalent) becomes more of an issue. In theory it is simple to send a decryption key every time you use a service, but for it to be realistic, it has to be practical, and it seems like the yubikey (with just a tiny bit more data) could make this really easy, as it is already capable of sending a tamper-proof secret payload.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2011">dbp</a> — Fri Apr 06, 2012 8:07 pm</p><hr />
]]></content>
</entry>
</feed>