Skip to main content

Questions tagged [hardware-token]

1 vote
1 answer
278 views

I use Bitwarden for password management, and it also manages passkeys, if so desired. When logging into my Google account, the creation and retrieval of my passkey is seamless, it was securely stored ...
Bennypr0fane's user avatar
3 votes
1 answer
2k views

I was looking at YubiKeys and noticed that they sell FIPS certified keys alongside non-FIPS certified keys. Both seem to have the same feature sets, but the FIPS certified keys are more expensive. ...
Unknown's user avatar
  • 195
2 votes
2 answers
269 views

With Fido2 becoming more popular we see more and more affordable Fido2 hardware security keys on the market. Can we use those tokens also for establishing a shared secret between two tokens? I would ...
Steffen Vogel's user avatar
0 votes
0 answers
154 views

I am looking for a solution to implement passwordless authentication using expirable hardware keys. It is for devices around the world with Windows OS, and sometimes service technicians have to do ...
Taras's user avatar
  • 101
1 vote
1 answer
2k views

I've heard that hardware keys like Yubikey are phishing resistant. But I do not understand where a phished man-in-the-middle attack, which tries to "forward" the whole communication, fails ...
Gere's user avatar
  • 157
1 vote
0 answers
190 views

I am looking for hardware TOTP system-on-chip, where it would not be possible for an adversary to extract the shared secret (TOTP seed in other words). I am researching an application, where one same ...
wick's user avatar
  • 111
0 votes
0 answers
156 views

I have an USB Token (brand 3SKey) containing a certificate "C" with its private key stuck on a machine "A". The certificate's private key is obviously not exportable and I'm not ...
Perfect28's user avatar
  • 143
3 votes
3 answers
2k views

As I understand, modern phishing is kind of like a man-in-the-middle attack. Let's say, for example that User u has an account in Domain d where he has an SMS based 2FA enabled. This is what the ...
Agnishom Chattopadhyay's user avatar
20 votes
5 answers
4k views

I was troubled from the very beginning by the fact that my U2F security fob acts as a keyboard and theoretically is able to press any key when no one is looking. Sometimes I accidentally touch it and ...
IlliakaillI's user avatar
3 votes
1 answer
1k views

I am trying to utilize the SafeNet eToken 5110CC, which basically has the IDPrime 940MD with the applet 4.4.2.A., to generate ECC keys with lengths 384bits and 521bits to no avail. The product brief ...
ARGYROU MINAS's user avatar
0 votes
1 answer
163 views

I'd like to encrypt some data on the server using a user-managed secret. I could just ask for a password and derive a key from that, but ideally I'd like to offer users the option of using a yubikey ...
Felipe's user avatar
  • 123
1 vote
2 answers
373 views

I've had this idea bouncing around in my head for a while, and I'm honestly surprised that it doesn't seem to be on the market. Which probably means that it wouldn't work well for some reason that ...
Joseph Montanaro's user avatar
1 vote
3 answers
420 views

One of my banks authenticate me using username and an one time passcode (8 numbers) generated by a hardware token they gave to me when I opened the account. On the surface it looks like that as long ...
Calmarius's user avatar
  • 1,985
2 votes
2 answers
401 views

Using a hardware security token as a second factor is generally considered quite a boost in security. But one of the issues I'm having is how to backup the (digital) keys used in the hardware device (...
n0542344's user avatar
  • 131
0 votes
1 answer
322 views

At work, years ago, I used to have a key-fob device that was about the size of a thumb-drive. It had a 4 digit LCD screen that the numbers changed every 60 seconds. When logging onto certain servers,...
Mark Stewart's user avatar

15 30 50 per page