Selected publications at LSV

Abstract:
The Yubikey is a small hardware device designed to authenticate a user against network-based services. Despite its widespread adoption (over a million devices have been shipped by Yubico to more than 20 000 customers including Google and Microsoft), the Yubikey protocols have received relatively little security analysis in the academic literature. In the first part of this paper, we give a formal model for the operation of the Yubikey one-time password (OTP) protocol. We prove security properties of the protocol for an unbounded number of fresh OTPs using a protocol analysis tool, tamarin.
    In the second part of the paper, we analyze the security of the protocol with respect to an adversary that has temporary access to the authentication server. To address this scenario, Yubico offers a small Hardware Security Module (HSM) called the YubiHSM, intended to protect keys even in the event of server compromise. We show if the same YubiHSM configuration is used both to set up Yubikeys and run the authentication protocol, then there is inevitably an attack that leaks all of the keys to the attacker. Our discovery of this attack lead to a Yubico security advisory in February 2012. For the case where separate servers are used for the two tasks, we give a configuration for which we can show using the same verification tool that if an adversary that can compromise the server running the Yubikey-protocol, but not the server used to set up new Yubikeys, then he cannot obtain the keys used to produce one-time passwords.

@inproceedings{KS-stm12,
   address = {Pisa, Italy},
   author = {K{\"u}nnemann, Robert and Steel, Graham},
   booktitle = {{R}evised {S}elected {P}apers of the 8th {W}orkshop on {S}ecurity and {T}rust {M}anagement ({STM}'12)},
   DOI = {10.1007/978-3-642-38004-4_17},
   editor = {J{\o}sang, Audun and Samarati, Pierangela and Petrocchi, Marinella},
   month = sep,
   pages = {257-272},
   publisher = {Springer},
   series = {Lecture Notes in Computer Science},
   title = {{Y}ubi{S}ecure? Formal Security Analysis Results for the {Y}ubikey and {Y}ubi{HSM}},
   url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/KS-stm12.pdf},
   volume = {7783},
   year = {2012},
}

About LSV