Transcript
Host Name (0:02)
You're listening to the Cyberwire Network powered by N2K.
Rick Howard (0:15)
The word is U2F, spelled U for universal, 2 for second and F for factor. An open standard for hardware authentication tokens that use the Universal Serial Bus or USB Near Field Communications or NFCS or Bluetooth to communicate one factor in a two factor authentication exchange. Example Sentence Initially, U2F was created by Google and Yubico, working in partnership, Origin and context in the 1960s, when computers started to become an essential tool for big business and government, the late, great Dr. Fernando Corbeto, one of computing's founding fathers, introduced the idea of using passwords to gain access to computer systems as a stopgap to prevent students from seeing their teachers files on the same mainframe. He had no idea that that method would reign as the number one authentication system for the next 60 years. That started to change in 1995 when AT&T patented the idea of two factor authentication. They said that to identify an authorized user, a system needed to check at least two of three something they have like a smartphone, something they are like a fingerprint, or something they know like a password. But the early systems were clunky, hard to manage, and only used in environments that needed the most security. In 2012, a number of commercial companies like PayPal and Lenovo formed the FIDO alliance, which stands for Fast Identity Online, with the purpose of developing a passwordless authentication protocol. By 2013, Google, Yubico, and another company, NXP, joined the alliance and brought with them the idea of an open source second factor authentication protocol. By 2015, the alliance announced support for contactless transport over Bluetooth and Near field communications, or nfcs. NFC is a protocol that helps two devices communicate wirelessly when they are placed right next to each other. The range is about 4 inches. Like using your mobile device to validate your boarding pass in airports, devices with NFC hardware can establish communications with other NFC equipped devices as well as NFC tags. NFC tags are unpowered NFC chips that draw power from nearby NFC devices. U2F, then, is a universal standard for creating physical authentication tokens that can work with any service. As of this writing, 2022, vendors like Google, Yubico, Thedis, and Kensington offer their versions of these tokens to the commercial market. Some use the NFC protocol, some use Bluetooth, and others plug into the USB ports so that they can be used to authenticate Web transactions. Nerd reference at the 2008 RSA Conference, Brett McDowell, the executive director for the FIDO alliance, explains at a high level how U2F keys work so keep this.
Host Name (3:45)
In mind as you go through and see the demos. This is what's happening under the hood. So you have the user, and they're being verified by the device. So the evidence that's exchanged between the user and the device is local, it's not going over the Internet. And that evidence can be a pin number, it can be a biometric, and that's between the user and their device. So you take out all the vulnerabilities of a remote attack. Then the device, once satisfied that it has the correct user, will sign challenges per the Fido challenge response protocol. The private keys are generated by the authenticator on the device. Don't think of the authenticator as a widget. Think of the authenticator as a capability. It's a capability of that personal device. And the public key is stored with the username in the database in the cloud, so that when the the challenge is signed by the correct private key, the application knows that it could only have received that mathematical result from the correct device per the correct user. And we call that party, the relying party is the application in the cloud, because they are relying upon the Fido authenticator to do its job. So that, in essence, is what's happening under the hood.
![Universal 2nd Factor (U2F) (noun) [Word Notes] - Hacking Humans cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F0a4975aa-60c6-11f0-a45c-abbf8318f75c%2Fimage%2F441b0ca2db080b93b935568d381ce462.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)