<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=35&amp;t=2348" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2016-06-29T03:18:36+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=35&amp;t=2348</id>
<entry>
<author><name><![CDATA[dain]]></name></author>
<updated>2016-06-29T03:18:36+01:00</updated>
<published>2016-06-29T03:18:36+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2348&amp;p=8749#p8749</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2348&amp;p=8749#p8749"/>
<title type="html"><![CDATA[Re: [QUESTION] Can Yubikey4 do SHA2 instead of SHA1 for chal]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2348&amp;p=8749#p8749"><![CDATA[
Yes, you can do this with the YubiKey 4 or NEO. You have to store the key as a TOTP credential, which does not have a counter. Instead TOTP uses the current time as the challenge, which is passed to the YubiKey from the host PC. To do &quot;plain&quot; HMAC-SHA256 you would use the CALCULATE command, pass in your challenge, and specify that you want the full (non-truncated) response.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=504">dain</a> — Wed Jun 29, 2016 3:18 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[cruxic]]></name></author>
<updated>2016-06-22T23:50:35+01:00</updated>
<published>2016-06-22T23:50:35+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2348&amp;p=8740#p8740</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2348&amp;p=8740#p8740"/>
<title type="html"><![CDATA[Re: [QUESTION] Can Yubikey4 do SHA2 instead of SHA1 for chal]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2348&amp;p=8740#p8740"><![CDATA[
Thanks for the reply, dain.  Your argument that HMAC-SHA1 is still secure makes sense and I am comfortable with that.<br /><br />Can the Yubikey 4 really do plain HMAC-SHA256?  It seems that ykneo-oath would insist on including an incrementing counter in the hash.  If you're curious, I'm exploring the use of deterministic password generation for website logins:  HMAC(domain-name, seed-stored-in-yubikey).<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4128">cruxic</a> — Wed Jun 22, 2016 11:50 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[dain]]></name></author>
<updated>2016-06-20T18:41:10+01:00</updated>
<published>2016-06-20T18:41:10+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2348&amp;p=8734#p8734</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2348&amp;p=8734#p8734"/>
<title type="html"><![CDATA[Re: [QUESTION] Can Yubikey4 do SHA2 instead of SHA1 for chal]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2348&amp;p=8734#p8734"><![CDATA[
The attacks on SHA1 have to do with collision resistance. This means that any system relying on collision resistance should no longer be using SHA1. Digital signature schemes typically use a hash function to get a fixed-length value to sign, and that relies very much on collision resistance for security (as the Ars article points out).<br /><br />However, the challenge-response mechanism in the YubiKey uses HMAC-SHA1. HMAC does NOT rely on collision resistance (this has actually been formally proven), and is thus not affected by this problem at all. HMAC-SHA1 is still considered secure.<br /><br />The slot based challenge-response credentials use HMAC-SHA1, and we have no plans on changing this. However, the OATH applet available on the YubiKey NEO as well as YubiKey 4 provides HMAC-SHA256 in addition to HMAC-SHA1 (the YubiKey 4 even supports HMAC-SHA512 as well), but this applet needs to be invoked in a different way compared to the standard slots. For more information on that, go here: <!-- m --><a class="postlink" href="https://developers.yubico.com/ykneo-oath/Protocol.html">https://developers.yubico.com/ykneo-oath/Protocol.html</a><!-- m --><p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=504">dain</a> — Mon Jun 20, 2016 6:41 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[cruxic]]></name></author>
<updated>2016-06-16T21:04:29+01:00</updated>
<published>2016-06-16T21:04:29+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2348&amp;p=8727#p8727</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2348&amp;p=8727#p8727"/>
<title type="html"><![CDATA[[QUESTION] Can Yubikey4 do SHA2 instead of SHA1 for challeng]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2348&amp;p=8727#p8727"><![CDATA[
Hello,<br /><br />Can the Yubikey 4 do SHA2 instead of SHA1 for the HMAC challenge/response?  SHA1 is <a href="http://arstechnica.com/security/2015/10/sha1-crypto-algorithm-securing-internet-could-break-by-years-end/" class="postlink">considered insecure</a> nowadays.<br /><br />Thanks!<br /><br />EDIT: subject updated to include [QUESTION] tag.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4128">cruxic</a> — Thu Jun 16, 2016 9:04 pm</p><hr />
]]></content>
</entry>
</feed>