While I’ve been an employee with Yubico for a little more than two years now, my history with the company dates back a bit further. And the YubiKing contest we announced today to discover the next innovative use of the YubiKey transports me back to that time. Before I was an employee, I was a […]
Read moreWireless has become the de-facto connecting point for consumers today and even among enterprises, where employees expect to leave behind desktop Ethernet connections for wireless connectivity in board rooms, conference rooms and common areas. Apple makes this point emphatically with its new MacBook where the message is everything should be done without wires via technology […]
Read moreI work as a developer at Yubico. Like a lot of developers these days I’m empowered to not only develop software, but to publish it and configure the servers it runs on. This means that I have access to many systems, to which I authenticate using different keys, requiring the flexibility of a YubiKey. The […]
Read moreIn Part 2, we got a better understanding of what an algorithm like RSA does and what the length of a key entails. Now, in Part 3, we can talk about the elephant in the room. Are 2048-bit keys useless? And are your documents completely insecure if you are using them? What are the pros […]
Read moreIn Part 1 of our crypto blog, I briefly introduced the concept of asymmetric encryption algorithms and the general rule that the longer the key the better. Let’s take a deeper look at that logic here in Part 2. There are many asymmetric encryption algorithms, but lets focus on RSA, which is one of the […]
Read moreOne of the most interesting and useful aspects of the YubiKey NEO and NEO-n is that they can act as a smart card and come pre-loaded with a bunch of interesting applications, such as an implementation of OpenPGP Card. Many end-users like this functionality, but some question the key lengths. It’s an expected cryptographic question […]
Read moreTo better understand asymmetric cryptography, you need knowledge of some basic concepts. For those that are not familiar with public-key cryptography, I will provide here a brief, stripped-down introduction to the topic. In asymmetric or public-key encryption there are two main players: the encryption algorithm itself (RSA, ECC, ElGamal, …) and a cryptographic key pair (there […]
Read moreLast Friday I biked to Stanford to discuss online identity protection with the President of the United States. President Obama is a man passionate about the Internet and dedicated to helping secure it. After our short one-on-one conversation about Yubico solutions, he took the stage at the Stanford Memorial Auditorium. In front of him he had […]
Read moreIt’s always rewarding when you see third-party validation of your company’s product, and that is why today started off so well. In separate articles published today, Yubico’s YubiKey was highlighted for its tight security and ease of use by authors Don Sambandaraksa at TelecomAsia.net, which is aimed at the telecom market, and Greg Harvey, co-founder […]
Read moreAfter Silicon Valley, Sweden is considered one of the world’s more interesting tech innovation hubs, giving birth to global brands such as Skype, MySQL, Spotify, King – and the rising Yubico! The growing and fruitful cross-pollenization between Silicon Valley and Sweden is the reason Victoria, Crown Princess of Sweden, and her husband, Prince Daniel, this […]
Read more