Tag: cryptography

Home » cryptography
  • Yubico Logoboeing-customer-offerBoeing has identified the Yubico YubiHSM 2 as a USB Hardware Security Module (HSM) device that will meet key and certificate management requirements identified in ATA Spec 42, Level 4.Read morecryptographyYubiHSMYubiHSM 2
  • Yubico LogoWhat is a Passkey?Learn the definition of Passkey and get answers to FAQs regarding: What is Passkey, how does it work, and more.Read morecryptographypasskeyphishing-resistant MFA
  • PrimeKey partner briefPrimeKey and Yubico together simplify and secure the management of cryptographic keys.Read morecryptography
  • PrimeKey + Intercede partner briefBest practice lifecycle management and security for hardware-protected cryptographic keys.Read morecryptography
  • Yubico LogoYubico Launches YubiHSM 2: The World’s Smallest and Best Price/Performance Hardware Security Module, Providing Root of Trust for Servers and Computing Devices  The YubiHSM 2 differs from traditional HSM models — historically limited in use by cost, size, and performance — by offering advanced digital key protection capabilities and benefits at a price within reach for all organizations. Delivered in an ultra-slim “nano” form factor, the YubiHSM 2 fits inside a USB port, eliminating the need […]Read moreabout YubicocryptographyHardware Security ModuleYubiHSMYubiKey
  • Yubico Expands FIPS Security CertificationFor the past two years, Yubico has executed on an aggressive strategy to validate its cryptographic devices against established federal standards. The first YubiKey device was validated in 2014 (NIST cert #2267) and, last week, the YubiKey 4 began the National Institute of Standards and Technology (NIST) validation process for compliance with the Federal Information […]Read morecryptographyFIPS 140-2government
  • YubiKey 4(096): You Asked, We DeliveredIn a previous blog post I talked about RSA key length and argued why a 2048-bit key is still a viable choice today. However, here at Yubico we do not like to remain idle, twiddling our thumbs. We are constantly improving our products. As a result of these efforts, earlier this month, we launched the […]Read morecryptographydevelopersYubiKey 4
  • With a Touch, Yubico, Docker Revolutionize Code SigningToday we released the YubiKey 4. Our next generation product that includes a new function called touch-to-sign, a unique and simple method for code signing that we have brought to life together with Docker, an open platform for distributed applications. At DockerCon Europe 2015 in Barcelona, Docker and Yubico together unveiled the world’s first touch-to-sign code […]Read morecryptographydevelopersYubiKey 4
  • Does Key Size Really Matter in Cryptography?One of the most interesting and useful aspects of the YubiKey NEO and NEO-n is that they can act as a smart card and come pre-loaded with a bunch of interesting applications, such as an implementation of OpenPGP Card. Many end-users like this functionality, but some question the key lengths. It’s an expected cryptographic question […]Read morecryptographyOpenPGPYubiKey NEO
  • A Crash Course in CryptographyTo better understand asymmetric cryptography, you need knowledge of some basic concepts. For those that are not familiar with public-key cryptography, I will provide here a brief, stripped-down introduction to the topic. In asymmetric or public-key encryption there are two main players: the encryption algorithm itself (RSA, ECC, ElGamal, …) and a cryptographic key pair (there […]Read morecryptographydevelopersFIDO U2F security key