SlideShare a Scribd company logo
1 of 20
David Page
                  Director
The OTOBAS Group Pty. Ltd.
        BarCamp Canberra
            28 March 2009
Content
 Background to Authentication
 OpenID – centralised identity management
 Identity Theft
 Multi-factor Authentication
 The Yubikey
 Useful Links
Background to Authentication
 What is Authentication?
   From the Greek, meaning real or genuine
   the act of establishing or confirming something (or
    someone) as authentic, that is, that claims made by or
    about the subject are true
 Why Authenticate?
   Restrict access to resources (log on to laptop)
   Identify user contributions (comments on a blog)
   Non repudiation (e.g. tax lodgements)
Background to Authentication
 Authentication Factors
    the ownership factors: Something the user has
    the knowledge factors: Something the user knows
    the inherence factors: Something the user is or does
        E.g. Fingerprint, retina voice
    
Background to Authentication
 How to Authenticate
   Single factor
        E.g. user id and password
    

   Multi factor
        E.g. Bank EFTPOS card and pin
    

   Captchas – authenticating that you are human!
Background to Authentication
 Establishing Credentials
    Simple registration – e.g. Google, TrueCrypt
    Self certification – e.g. web site certificate for SSL
    Trust chains – e.g. PGP certificates
    3rd party certification – e.g. VeriSign
Problems
 Problem #1: managing all the types of authentication
    E.g. multiple PINs, multiple user ids and passwords
 Problem: #2: identify theft
    E.g. keystroke loggers, phishing attacks, dumpster
     diving, lost laptop
OpenID
 http://openid.net/
 Single point of authority for user credentials
    A bit like PayPal is for your credit card/bank details
 Already supported by a range of major providers
    E.g. Yahoo, Flickr, Blogger, Google, Wordpress,
     LiveJournal, AOL, VeriSign
 You can also set up your own OpenID Server
 Demo – VeriSign Personal Identity Page
 Solves the first problem (multiple accounts), but not
  the second (identity theft)
Identity Theft
 Has become an increasing problem
   Physical access compromised (e.g. lost laptop)
   Brute force (eg. dictionary) attacks
   Credit card details poorly protected by 3rd parties
   Keystroke loggers in malware
   “Clickjacking”
   Social engineering
 Higher security access requires stronger
  authentication – e.g. multi-factor
Multi-factor Authentication
 Typically two-factor is “something you have” and
  “something you know”, e.g. EFTPOS card and PIN
 But need to consider replay attacks, e.g. credit card
  and security code is NOT true two-factor
   RSA, SecurID one-time password token (e.g. PayPal)
   Mobile phone SMS codes
   But can be difficult/expensive to implement and
    integrate
Multi-factor Authentication
 Really secure access (e.g. physical access to a data
  centre), may warrant three-factor authentication
   Something you have, something you know, and
    something you are, e.g. userid, password and fingerprint
 Biometric authentication is increasing in popularity
    Fingerprint can serve both as WHO you are as well as
     WHAT you are
    Cost of implementation coming down, integrated
     devices becoming more common
    But not available everywhere as yet, particularly in
     legacy devices
Enter the YubiKey
 Made by a Swedish company – http://yubico.com
 Acts like a USB keyboard - supports most computers
 Generates a fixed userid and a one-time password
 Can also generate a fixed long/complex password
 Very small form factor – easy/cheap to deploy
 Yubico can authenticate you via OpenID or via free
  open source web service clients
 Open source authentication servers are provided free
   Java, C, PHP, Python, Perl, PAM (Linux)
YubiKey – How it Works
 YubiKeys contain a 128-bit AES key, initially set by Yubico
    AES is a symmetric cypher, not public/private key
    You can generate your own AES key
 When the button is pressed, the YubiKey generates a 44
  character string consisting of:
    A fixed userid (12 characters)
    A one-time password (32 characters)
 300,000,000,000,000,000,000,000,000,000,000,000,000
  (3*10**38) combinations
 Can also be configured to navigate to a specific web site and
  authenticate with one button press (Windows only at
  present)
YubiKey – How it Works
 User id (12 characters):
    vvuelcnnljrd
 One-Time Password (32 characters):
    brihhlvhgbcnlufjlvnuirudeunknlkn
 Characters are encoded in ModHex for compatability
 Sample output:
    vvuelcnnljrdbtrffffdhhlidlhijrbckjgtlgcbnnnh
    vvuelcnnljrdhrrbkfkhjfvturlkehrrfhkijdljbcdf
    vvuelcnnljrdettngeieevitvlhvtjghilkttkhueglg
YubiKey – How it Works
 The AES key is used to encrypt a set of data for the OTP:
    A hidden identity field to verify the decrypted result
    A volatile counter , incremented by one for each code that has
     been generated. The code is reset at each power-up
    A non-volatile counter , incremented by one for each power-
     up event. The value of this counter is preserved even when
     power is lost
    A non-predictable counter value is fed by a time-base that is
     highly device and session dependent.
    A random seed
    A simple checksum
YubiKey Features
 Can operate in single or two-factor mode
    Just rely on embedded userid and one-time password
     (operates as “something you have”)
    Add either separate userid and/or password to
     embedded userid and OTP (operates as “something you
     have” and “something you know”)
 YubiKey Demo
 Mashed Life Demo
YubiKey – Other Features
 “One time pad” approach means no time-based sync
 Hardware based solution means proof against trojans
    (unlike software based solutions)
   No battery to run down (unlike RSA key)
   No time limit (unlike certificate-based solutions)
   Small form factor (easy to ship/carry)
   Fast and easy to use – lower user resistance
   Low cost (approx $US25 one off, $US10 in quantity)
Useful Links
 Yubico
 Yubico Twitter Feed
 YubiKey Security Analysis
 Steve Gibson talking about YubiKey
 AES Encryption
 Mashed Life
The Yubikey

More Related Content

What's hot

Cloud Forensics
Cloud ForensicsCloud Forensics
Cloud Forensics
sdavis532
 

What's hot (20)

Identity and access management
Identity and access managementIdentity and access management
Identity and access management
 
Physical Security
Physical SecurityPhysical Security
Physical Security
 
NTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in DepthNTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in Depth
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Working with MS Endpoint Manager
Working with MS Endpoint ManagerWorking with MS Endpoint Manager
Working with MS Endpoint Manager
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
What is two factor or multi-factor authentication
What is two factor or multi-factor authenticationWhat is two factor or multi-factor authentication
What is two factor or multi-factor authentication
 
Secure Your Encryption with HSM
Secure Your Encryption with HSMSecure Your Encryption with HSM
Secure Your Encryption with HSM
 
Cloud Computing Security From Sngle to multi Clouds Full Documentaion
Cloud Computing Security From Sngle to multi Clouds Full DocumentaionCloud Computing Security From Sngle to multi Clouds Full Documentaion
Cloud Computing Security From Sngle to multi Clouds Full Documentaion
 
Microsoft Information Protection.pptx
Microsoft Information Protection.pptxMicrosoft Information Protection.pptx
Microsoft Information Protection.pptx
 
Fog computing
Fog computingFog computing
Fog computing
 
SC-900+2022.pdf
SC-900+2022.pdfSC-900+2022.pdf
SC-900+2022.pdf
 
On premise vs cloud server
On premise vs cloud serverOn premise vs cloud server
On premise vs cloud server
 
Microsoft Azure Overview
Microsoft Azure OverviewMicrosoft Azure Overview
Microsoft Azure Overview
 
Cloud Migration - Cloud Computing Benefits & Issues
Cloud Migration - Cloud Computing Benefits & IssuesCloud Migration - Cloud Computing Benefits & Issues
Cloud Migration - Cloud Computing Benefits & Issues
 
Cloud Forensics
Cloud ForensicsCloud Forensics
Cloud Forensics
 
Passwords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to goPasswords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to go
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar to The Yubikey

Typical Vulnerabilities of E-Banking Systems
Typical Vulnerabilities of E-Banking SystemsTypical Vulnerabilities of E-Banking Systems
Typical Vulnerabilities of E-Banking Systems
Positive Hack Days
 
SecureOTP: Total One-Time-Password Solution
SecureOTP: Total One-Time-Password SolutionSecureOTP: Total One-Time-Password Solution
SecureOTP: Total One-Time-Password Solution
Rafidah Ariffin
 
Generic Attack Detection - ph-Neutral 0x7d8
Generic Attack Detection - ph-Neutral 0x7d8Generic Attack Detection - ph-Neutral 0x7d8
Generic Attack Detection - ph-Neutral 0x7d8
Mario Heiderich
 
OpenOffice.org Digital Signatures, OOoCon 2004
OpenOffice.org Digital Signatures, OOoCon 2004OpenOffice.org Digital Signatures, OOoCon 2004
OpenOffice.org Digital Signatures, OOoCon 2004
Malte Timmermann
 
How LinkedIn changed its security model in order to offer an API
How LinkedIn changed its security model  in order to offer an APIHow LinkedIn changed its security model  in order to offer an API
How LinkedIn changed its security model in order to offer an API
LinkedIn
 

Similar to The Yubikey (20)

Typical Vulnerabilities of E-Banking Systems
Typical Vulnerabilities of E-Banking SystemsTypical Vulnerabilities of E-Banking Systems
Typical Vulnerabilities of E-Banking Systems
 
SecureOTP: Total One-Time-Password Solution
SecureOTP: Total One-Time-Password SolutionSecureOTP: Total One-Time-Password Solution
SecureOTP: Total One-Time-Password Solution
 
Generic Attack Detection - ph-Neutral 0x7d8
Generic Attack Detection - ph-Neutral 0x7d8Generic Attack Detection - ph-Neutral 0x7d8
Generic Attack Detection - ph-Neutral 0x7d8
 
Getting Started With WebAuthn
Getting Started With WebAuthnGetting Started With WebAuthn
Getting Started With WebAuthn
 
Authentication Without Authentication
Authentication Without AuthenticationAuthentication Without Authentication
Authentication Without Authentication
 
Securing Web Applications with Token Authentication
Securing Web Applications with Token AuthenticationSecuring Web Applications with Token Authentication
Securing Web Applications with Token Authentication
 
Is your mobile app as secure as you think?
Is your mobile app as secure as you think?Is your mobile app as secure as you think?
Is your mobile app as secure as you think?
 
RSA SecurID Access
RSA SecurID AccessRSA SecurID Access
RSA SecurID Access
 
Owasp top 10 2013
Owasp top 10 2013Owasp top 10 2013
Owasp top 10 2013
 
Duke Pci T Raining Slides
Duke Pci T Raining SlidesDuke Pci T Raining Slides
Duke Pci T Raining Slides
 
Digital Identity
Digital IdentityDigital Identity
Digital Identity
 
OpenOffice.org Digital Signatures, OOoCon 2004
OpenOffice.org Digital Signatures, OOoCon 2004OpenOffice.org Digital Signatures, OOoCon 2004
OpenOffice.org Digital Signatures, OOoCon 2004
 
Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)
 
authentication.ppt
authentication.pptauthentication.ppt
authentication.ppt
 
mDevCamp 2016 - Zingly, or how to design multi-banking app
mDevCamp 2016 - Zingly, or how to design multi-banking appmDevCamp 2016 - Zingly, or how to design multi-banking app
mDevCamp 2016 - Zingly, or how to design multi-banking app
 
How LinkedIn changed its security model in order to offer an API
How LinkedIn changed its security model  in order to offer an APIHow LinkedIn changed its security model  in order to offer an API
How LinkedIn changed its security model in order to offer an API
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lecture
 
Introducing IoT Crusher (Open Source Version)
Introducing IoT Crusher (Open Source Version)Introducing IoT Crusher (Open Source Version)
Introducing IoT Crusher (Open Source Version)
 
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
 
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

The Yubikey

  • 1. David Page Director The OTOBAS Group Pty. Ltd. BarCamp Canberra 28 March 2009
  • 2. Content  Background to Authentication  OpenID – centralised identity management  Identity Theft  Multi-factor Authentication  The Yubikey  Useful Links
  • 3. Background to Authentication  What is Authentication?  From the Greek, meaning real or genuine  the act of establishing or confirming something (or someone) as authentic, that is, that claims made by or about the subject are true  Why Authenticate?  Restrict access to resources (log on to laptop)  Identify user contributions (comments on a blog)  Non repudiation (e.g. tax lodgements)
  • 4. Background to Authentication  Authentication Factors  the ownership factors: Something the user has  the knowledge factors: Something the user knows  the inherence factors: Something the user is or does E.g. Fingerprint, retina voice 
  • 5. Background to Authentication  How to Authenticate  Single factor E.g. user id and password   Multi factor E.g. Bank EFTPOS card and pin   Captchas – authenticating that you are human!
  • 6. Background to Authentication  Establishing Credentials  Simple registration – e.g. Google, TrueCrypt  Self certification – e.g. web site certificate for SSL  Trust chains – e.g. PGP certificates  3rd party certification – e.g. VeriSign
  • 7. Problems  Problem #1: managing all the types of authentication  E.g. multiple PINs, multiple user ids and passwords  Problem: #2: identify theft  E.g. keystroke loggers, phishing attacks, dumpster diving, lost laptop
  • 8. OpenID  http://openid.net/  Single point of authority for user credentials  A bit like PayPal is for your credit card/bank details  Already supported by a range of major providers  E.g. Yahoo, Flickr, Blogger, Google, Wordpress, LiveJournal, AOL, VeriSign  You can also set up your own OpenID Server  Demo – VeriSign Personal Identity Page  Solves the first problem (multiple accounts), but not the second (identity theft)
  • 9. Identity Theft  Has become an increasing problem  Physical access compromised (e.g. lost laptop)  Brute force (eg. dictionary) attacks  Credit card details poorly protected by 3rd parties  Keystroke loggers in malware  “Clickjacking”  Social engineering  Higher security access requires stronger authentication – e.g. multi-factor
  • 10. Multi-factor Authentication  Typically two-factor is “something you have” and “something you know”, e.g. EFTPOS card and PIN  But need to consider replay attacks, e.g. credit card and security code is NOT true two-factor  RSA, SecurID one-time password token (e.g. PayPal)  Mobile phone SMS codes  But can be difficult/expensive to implement and integrate
  • 11. Multi-factor Authentication  Really secure access (e.g. physical access to a data centre), may warrant three-factor authentication  Something you have, something you know, and something you are, e.g. userid, password and fingerprint  Biometric authentication is increasing in popularity  Fingerprint can serve both as WHO you are as well as WHAT you are  Cost of implementation coming down, integrated devices becoming more common  But not available everywhere as yet, particularly in legacy devices
  • 12. Enter the YubiKey  Made by a Swedish company – http://yubico.com  Acts like a USB keyboard - supports most computers  Generates a fixed userid and a one-time password  Can also generate a fixed long/complex password  Very small form factor – easy/cheap to deploy  Yubico can authenticate you via OpenID or via free open source web service clients  Open source authentication servers are provided free  Java, C, PHP, Python, Perl, PAM (Linux)
  • 13. YubiKey – How it Works  YubiKeys contain a 128-bit AES key, initially set by Yubico  AES is a symmetric cypher, not public/private key  You can generate your own AES key  When the button is pressed, the YubiKey generates a 44 character string consisting of:  A fixed userid (12 characters)  A one-time password (32 characters)  300,000,000,000,000,000,000,000,000,000,000,000,000 (3*10**38) combinations  Can also be configured to navigate to a specific web site and authenticate with one button press (Windows only at present)
  • 14. YubiKey – How it Works  User id (12 characters):  vvuelcnnljrd  One-Time Password (32 characters):  brihhlvhgbcnlufjlvnuirudeunknlkn  Characters are encoded in ModHex for compatability  Sample output:  vvuelcnnljrdbtrffffdhhlidlhijrbckjgtlgcbnnnh  vvuelcnnljrdhrrbkfkhjfvturlkehrrfhkijdljbcdf  vvuelcnnljrdettngeieevitvlhvtjghilkttkhueglg
  • 15. YubiKey – How it Works  The AES key is used to encrypt a set of data for the OTP:  A hidden identity field to verify the decrypted result  A volatile counter , incremented by one for each code that has been generated. The code is reset at each power-up  A non-volatile counter , incremented by one for each power- up event. The value of this counter is preserved even when power is lost  A non-predictable counter value is fed by a time-base that is highly device and session dependent.  A random seed  A simple checksum
  • 16.
  • 17. YubiKey Features  Can operate in single or two-factor mode  Just rely on embedded userid and one-time password (operates as “something you have”)  Add either separate userid and/or password to embedded userid and OTP (operates as “something you have” and “something you know”)  YubiKey Demo  Mashed Life Demo
  • 18. YubiKey – Other Features  “One time pad” approach means no time-based sync  Hardware based solution means proof against trojans (unlike software based solutions)  No battery to run down (unlike RSA key)  No time limit (unlike certificate-based solutions)  Small form factor (easy to ship/carry)  Fast and easy to use – lower user resistance  Low cost (approx $US25 one off, $US10 in quantity)
  • 19. Useful Links  Yubico  Yubico Twitter Feed  YubiKey Security Analysis  Steve Gibson talking about YubiKey  AES Encryption  Mashed Life