
Technical overview of Yubikey
U2F is a challenge-response protocol extended withphishing andMitMprotection,application-specific keys,device cloning detectionanddevice attestation. There are two flows: registration and authentication.

1. Challenge-response
We start out with a simple challenge-response authentication flow, based on public-key cryptography. The U2F device has a private key kpriv and the RPis given the corresponding public key(kpub). The key pair is generated in the device’s tamper-resistant execution environment, from where kpriv cannot leave.

2. Phishing en MitM bescherming
The concept is that the client compiles what it knows about the current HTTP connection (URI and TLS Channel ID). This information is then signed by the U2F device and sent to the RP, which verifies that the information is correct.
Additions to the authentication flow:
- Origin (URI) — prevents phishing.
- TLS Channel ID (optional) — prevents MitM.

3. Application-specific keys
Application-specific keys prevents relying parties from tracking devices between different user accounts. This means that Example.com cannot know whether User1 and User2 shares the same device.
The U2F device generates a new key pair and key handle for each registration. The handle is stored by the RP and sent back to the device upon authentication. This way, the device knows which key to authenticate with (e.g. User1‘s key or User2‘s key).
Additions to the authentication flow:
- Key generation on the device
- Key handle, stored by the server together with kpub.
- App ID, used for scoping a key handle.

4. Device cloning detection
As already mentioned, Yubico’s U2F devices are tamper-resistant and kpriv cannot be read externally (at the very least not undetected). However, to provide cloning detection to U2F devices without tamper-resistant secure elements (e.g software implementations) we add an authentication counter. The concept is simple: The device increments the counter when authenticating, and the RP verifies that the counter is higher than last time.
Additions to the authentication flow:
- A counter is sent from the device to the RP.

5. Device attestation
Attestation gives relying parties the possibility to verify token properties, such as token model. It is implemented via an attestation certificate, signed by the device vendor, that the device sends to the RP upon registration. Attestation does not affect the authentication flow.
Additions to the registration flow:
- Attestation certificate

U2F Key Generation
A U2F device should generate a new ECC key pair for each service it registers with. When authenticating, the device should use the previously generated key for that service. This is trivial, but gets more complex as we add more requirements:
Our products
Here you can view our products and continue browsing if you'd like.
-
YubiKey BIO
Regular price €89,99 EURRegular priceUnit price / per -
YubiKey 5 NFC (OTP + U2F + CCID)
Regular price €49,99 EURRegular priceUnit price / per -
YubiKey 5C NFC (OTP + U2F + CCID)
Regular price €54,99 EURRegular priceUnit price / per -
Yubico FIDO2 U2F Security Key NFC
Regular price €24,99 EURRegular priceUnit price / per -
Yubico Security Key C NFC
Regular price €28,99 EURRegular priceUnit price / per -
Yubico Security Key Series Bundle
Regular price €50,99 EURRegular priceUnit price / per€53,98 EURSale price €50,99 EURSale -
Yubico 5-Series bundle
Regular price €349,94 EURRegular priceUnit price / per€359,94 EURSale price €349,94 EURSale -
YubiKey C BIO - FIDO Edition
Regular price €94,99 EURRegular priceUnit price / per -
YubiKey 5Ci
Regular price €74,99 EURRegular priceUnit price / per -
YubiKey 5C
Regular price €54,99 EURRegular priceUnit price / per