Blog
Stay up to date on company and partner news, product tips, and industry trends.
-
Comparing Asymmetric Encryption Algorithms
In Part 1 of our crypto blog, I briefly introduced the concept of asymmetric encryption algorithms and the general rule that the longer the key the better. Let’s take a deeper look at that logic here in Part 2. There are many asymmetric encryption algorithms, but lets focus on RSA, which is one of the […]
Read more -
Does Key Size Really Matter in Cryptography?
One of the most interesting and useful aspects of the YubiKey NEO and NEO-n is that they can act as a smart card and come pre-loaded with a bunch of interesting applications, such as an implementation of OpenPGP Card. Many end-users like this functionality, but some question the key lengths. It’s an expected cryptographic question […]
Read more -
A Crash Course in Cryptography
To better understand asymmetric cryptography, you need knowledge of some basic concepts. For those that are not familiar with public-key cryptography, I will provide here a brief, stripped-down introduction to the topic. In asymmetric or public-key encryption there are two main players: the encryption algorithm itself (RSA, ECC, ElGamal, …) and a cryptographic key pair (there […]
Read more -
Yubico Meets President Obama
Last Friday I biked to Stanford to discuss online identity protection with the President of the United States. President Obama is a man passionate about the Internet and dedicated to helping secure it. After our short one-on-one conversation about Yubico solutions, he took the stage at the Stanford Memorial Auditorium. In front of him he had […]
Read more -
We Love Third-Party Validation!
It’s always rewarding when you see third-party validation of your company’s product, and that is why today started off so well. In separate articles published today, Yubico’s YubiKey was highlighted for its tight security and ease of use by authors Don Sambandaraksa at TelecomAsia.net, which is aimed at the telecom market, and Greg Harvey, co-founder […]
Read more -
The Key and the Princess
After Silicon Valley, Sweden is considered one of the world’s more interesting tech innovation hubs, giving birth to global brands such as Skype, MySQL, Spotify, King – and the rising Yubico! The growing and fruitful cross-pollenization between Silicon Valley and Sweden is the reason Victoria, Crown Princess of Sweden, and her husband, Prince Daniel, this […]
Read more -
YubiKey’s Hollywood Cameo Trips up Bad Guys
The YubiKey made it into Hollywood’s spotlight last weekend, taking on a plot-turning cameo appearance in the movie Blackhat. (Cue the suspenseful music). When it was all said and done, the YubiKey showed some of the power of two-factor authentication – not in terms of fingering (pun intended) the suspect, but narrowing the field of potential […]
Read more -
FIDO U2F Ecosystem Coming Alive
Update: New entries added to Enterprise Software list; new section, Governments, added; April 13, 2016 FIDO U2F (Universal 2nd Factor) is, as the name implies, a universal protocol that supports a wide range of modalities and use cases. Many people forget this fact given the current popularity of the USB form factor. But evidence is mounting including biometric, software, […]
Read more -
Yubico at CES ShowStoppers
Today, Yubico is demonstrating how to protect Google and WordPress accounts with YubiKey and U2F open standard at the ShowStoppers event (booth A-13) at CES 2015 (Consumer Electronics Show). With the mission to make secure login easy and available for everyone, Yubico serves as a FIDO Alliance board member and is co-author and key driver […]
Read more -
U2F, WordPress and Security for the People
Only a few weeks after Google announced U2F support and the protocol’s technical specifications were published, a U2F plugin for WordPress popped up and proved that U2F is the simple and open authentication protocol we envisioned it to be. High-security, public key hardware is no longer limited to a few enterprises and government services, but available […]
Read more