<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=4&amp;t=51" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2008-06-04T10:47:36+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=4&amp;t=51</id>
<entry>
<author><name><![CDATA[Simon]]></name></author>
<updated>2008-06-04T10:47:36+01:00</updated>
<published>2008-06-04T10:47:36+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=51&amp;p=158#p158</id>
<link href="https://forum.yubico.com/viewtopic.php?t=51&amp;p=158#p158"/>
<title type="html"><![CDATA[Re: Only a few bits of the token change from each...]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=51&amp;p=158#p158"><![CDATA[
This led to some questions in email so we'd like to clarify something:<br /><br />This change does not change the cryptographic properties, and the change isn't done to combat any attack including theoretical attacks.  We still assume AES-128 is resistant to known-plaintext attacks.<br /><br />/Simon<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2">Simon</a> — Wed Jun 04, 2008 10:47 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Jakob]]></name></author>
<updated>2008-06-03T23:05:02+01:00</updated>
<published>2008-06-03T23:05:02+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=51&amp;p=154#p154</id>
<link href="https://forum.yubico.com/viewtopic.php?t=51&amp;p=154#p154"/>
<title type="html"><![CDATA[Entropy increased]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=51&amp;p=154#p154"><![CDATA[
Based on input from this forum, additional entropy is added from firmware version 1.3.0 that is due to be released soon.<br /><br />In order to maintain compatibility with existing versions, we've decided to seed the 24-bit timestamp with a random value at startup rather than having it start at zero.<br /><br />Jakob E<br />Hardware- and firmware guy @ Yubico<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=83">Jakob</a> — Tue Jun 03, 2008 11:05 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[hrag]]></name></author>
<updated>2008-05-20T20:40:49+01:00</updated>
<published>2008-05-20T20:40:49+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=51&amp;p=57#p57</id>
<link href="https://forum.yubico.com/viewtopic.php?t=51&amp;p=57#p57"/>
<title type="html"><![CDATA[Only a few bits of the token change from each...]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=51&amp;p=57#p57"><![CDATA[
Q: Only a few bits of the token change from each authentication request - and an attacker could guess some of the plaintext if they knew the approximate current sequence number - have you done any research with regard to the impact this has on cryptoanalysis?<br /><br />A: We have a 16-bit random number and and a 16-bit CRC together with the counter- and timer fields. So there is a bit more stocastic means than just the counters themseleves.<br /><br />We have been thinking of increasing the random part to make the string less deterministic. It would be a very simple thing to do<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=58">hrag</a> — Tue May 20, 2008 8:40 pm</p><hr />
]]></content>
</entry>
</feed>