Tag: side-channel attack
-
Schneier on Security: YubiKey Side-Channel Attack
Source URL: https://www.schneier.com/blog/archives/2024/09/yubikey-side-channel-attack.html Source: Schneier on Security Title: YubiKey Side-Channel Attack Feedly Summary: There is a side-channel attack against YubiKey access tokens that allows someone to clone a device. It’s a complicated attack, requiring the victim’s username and password, and physical access to their YubiKey—as well as some technical expertise and equipment. Still, nice piece…
-
Wired: YubiKeys Are a Security Gold Standard—but They Can Be Cloned
Source URL: https://arstechnica.com/security/2024/09/yubikeys-are-vulnerable-to-cloning-attacks-thanks-to-newly-discovered-side-channel/ Source: Wired Title: YubiKeys Are a Security Gold Standard—but They Can Be Cloned Feedly Summary: Security researchers have discovered a cryptographic flaw that leaves the YubiKey 5 vulnerable to attack. AI Summary and Description: Yes Summary: The text discusses a critical vulnerability in the YubiKey 5 hardware token due to a side-channel…
-
Hacker News: Yubikeys are vulnerable to cloning attacks thanks to side channel
Source URL: https://arstechnica.com/security/2024/09/yubikeys-are-vulnerable-to-cloning-attacks-thanks-to-newly-discovered-side-channel/ Source: Hacker News Title: Yubikeys are vulnerable to cloning attacks thanks to side channel Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses a significant cryptographic vulnerability in the YubiKey 5 hardware authentication token, which has implications for security professionals and organizations relying on hardware tokens for two-factor authentication.…
-
Hacker News: EUCLEAK Side-Channel Attack on the YubiKey 5 Series
Source URL: https://ninjalab.io/eucleak/ Source: Hacker News Title: EUCLEAK Side-Channel Attack on the YubiKey 5 Series Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses a significant security vulnerability discovered in the ECDSA implementation of Infineon Technologies’ cryptographic library found in FIDO hardware tokens, particularly impacting the YubiKey 5 Series. The vulnerability, termed…