BLE Challenge-Response Authentication Using Pre-Shared Key and SHA-256

I’m working on a Bluetooth Low Energy lock system and have implemented a challenge-response authentication flow for secure communication between the lock (an ESP32 device) and the user’s phone. I’m very new to these technologies, and was w… Continue reading BLE Challenge-Response Authentication Using Pre-Shared Key and SHA-256

BLE Challenge-Response Authentication Using Pre-Shared Key and SHA-256

I’m working on a Bluetooth Low Energy lock system and have implemented a challenge-response authentication flow for secure communication between the lock (an ESP32 device) and the user’s phone. I’m very new to these technologies, and was w… Continue reading BLE Challenge-Response Authentication Using Pre-Shared Key and SHA-256

How to implement challenge-response authentication using PKCS11

I have been searching for a way to use challenge-response over PKCS11, is that possible? I have found that it is possible for Windows Minidriver, but all the PKCS11 challenge-response protocols are custom and vendor defined.
How can someon… Continue reading How to implement challenge-response authentication using PKCS11

Is SCRAM secure if both the communication channel and the database got compromised?

I was learning about SCRAM and liked its ability to protect against various attacks (as mentioned in this MongoDB blog post), specifically:

Eavesdropping – The attacker can read all traffic exchanged between the client and server. To prot… Continue reading Is SCRAM secure if both the communication channel and the database got compromised?

Is the Seed-And-Key Challenge-Response used in Automotive Security really secure?

As an Automotive Security Professional, my state of the art approach to implement a Secure Access would be to have an ECU generate a challenge (nonce + ID), forward it to the tester who can pass the challenge to the backend system which si… Continue reading Is the Seed-And-Key Challenge-Response used in Automotive Security really secure?

How to decrypt a KeePass database using YubiKey Challenge-Response, but without token?

Imagine the following situation: You created a KeepassXC database and secured it with a strong passphrase, as well as the HMAC-SHA1 based Challenge-Response mechanism provided by a YubiKey. The secret for the YubiKey is backed up on paper … Continue reading How to decrypt a KeePass database using YubiKey Challenge-Response, but without token?