2013
DOI: 10.1007/978-3-642-41284-4_11
|View full text |Cite
|
Sign up to set email alerts
|

Side-Channel Attacks on the Yubikey 2 One-Time Password Generator

Abstract: Abstract. The classical way of authentication with a username-password pair is often insufficient: an adversary can choose from a multitude of methods to obtain the credentials, e.g., by guessing passwords using a dictionary, by eavesdropping on network traffic, or by installing malware on the system of the target user. To overcome this problem, numerous solutions incorporating a second factor in the authentication process have been proposed. A particularly wide-spread approach provides each user with a hardwa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 26 publications
(14 citation statements)
references
References 13 publications
0
14
0
Order By: Relevance
“…This is due to the fact that they require measurements that can only be done if the attacker has physical access to the machine. These include power [24,28,32], electromagnetic (EM) emanation [30], and acoustical [17,42] analyses, where the attacker needs to measure the power consumed, the EM field produced, or the sound produced by the device, respectively. In all cases, the instructions executed often have a distinct power, EM, or sound measurement.…”
Section: Side Channel Attacks On Cryptography Implementationsmentioning
confidence: 99%
“…This is due to the fact that they require measurements that can only be done if the attacker has physical access to the machine. These include power [24,28,32], electromagnetic (EM) emanation [30], and acoustical [17,42] analyses, where the attacker needs to measure the power consumed, the EM field produced, or the sound produced by the device, respectively. In all cases, the instructions executed often have a distinct power, EM, or sound measurement.…”
Section: Side Channel Attacks On Cryptography Implementationsmentioning
confidence: 99%
“…We demonstrate in [ORP13] that SCA attacks are a relevant threat for the tokens: A non-invasive side-channel analysis exploiting the EM emanations of the AES implementation requires approximately 500 EM measurements to recover the full key. Given approximately one hour of access to a Yubikey 2, an adversary can impersonate the legitimate owner and generate valid one-time passwords, even after the token has been returned.…”
Section: One-time Password Tokensmentioning
confidence: 99%
“…An independent analysis was given by blogger Fredrik Björck in 2009 [6,7], raising issues that Yubico responded to in a subsequent post. Oswald, Richter, et al [21] analyze the YubiKey, generation 2, for side-channel attacks. They show that noninvasive measurements of the power consumption of the device allow retrieving the AES-key within approximately one hour of access.…”
Section: Related Workmentioning
confidence: 99%