DOC PREVIEW
CSUSM MIS 304 - The YubiKey... Protecting your Data

This preview shows page 1-2-3 out of 9 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 9 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 9 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 9 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 9 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

The YubiKey...Protecting your DataMIS 304 - Terrence LoftusWednesday, February 3, 2010What is it?The YubiKey is a small device carried by a user and its purpose is to authenticate the owner against some service. Login for WindowsLogin for MacLogin for ApplicationsLogin for Active DirectoryLogin for Password ManagersLogin for Web Sites & ServicesWednesday, February 3, 2010Policies/ People Problem:Too many passwords...A password for your home emailA password for your work emailA password for your online banking siteA password for Facebook/MySpaceA password for GoogleA password for your school accountsA passwords for online shoppingA password for ___________ Wednesday, February 3, 2010One possible solutionThe user connects the device to his or her computer through the USB port. The device receives power through the USB connection, and does not need any external power supply or a built-in battery. By emulating a USB keyboard, no device drivers or other special software needs to be installed in the computer. The device is equipped with a touch button that triggers an authentication attempt.**Source: YubicoWednesday, February 3, 2010DemoSystem Loginand example case (SRA Wireless)Wednesday, February 3, 2010Works with OpenIDWorks with Google Apps Premier API’sAuthlite: Windows Active Directory integrated loginSun: Open SSO authentication serverWordPress: Blog editing toolLastPass: Password manger serviceAnd many more...Applications and ServicesUsesWednesday, February 3, 2010BenefitsSimple & SecureOnly $25 per unit (less for volume)The device is independent of the operating system, hardware and application, as long as the operating system supports USB Human Interface Device (HID). The YubiKey uses the 128-bit block length AES cipher with 128-bit keys in ECB mode to encrypt authentication tokens. A brute force attack to exhaust the entire key space would require in the order of 2^128 operationWednesday, February 3, 2010SecureAnyone know how big 2^128 is?That’s a lot of zeros!Wednesday, February 3, 2010Thank youWednesday, February 3,


View Full Document

CSUSM MIS 304 - The YubiKey... Protecting your Data

Documents in this Course
EPORO

EPORO

9 pages

NEST

NEST

10 pages

Load more
Download The YubiKey... Protecting your Data
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view The YubiKey... Protecting your Data and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view The YubiKey... Protecting your Data 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?