Browse over 10,000 Electronics Projects using the Page Numbering provided at the bottom of each Page.

Breaking a Teensy U2F implementation: why you shouldn’t write your own crypto

Breaking a Teensy U2F implementation: why you shouldn’t write your own crypto

Aidan (a.k.a. makomk) writes:

A while ago, Google created a two-factor authentication scheme called U2F. The general idea is as follows. You have a little USB dongle that you can register with sites. When you enable U2F on a site, the dongle gives that site a public key and a key handle, and that dongle is the only device that can use that key handle to sign things with the corresponding public key. So from then on, websites can hand over the key handle and a challenge, and if they get back a valid signature they know that whoever’s logging in has the dongle you used to sign up.

More details at The Lair of Mako site.

 

Top