Kerry Wong conducts a teardown of a SecurID token, which includes a unique epoxy/glue method of assembly and also a protection mechanism that somehow detects when the token has been tampered with.
These RSA SecurID tokens basically are just pseudo-random number generators. Each token displays a random number from the sequence predetermined by the seed value and the algorithm every minute. During authentication, the user selected passcode (typically chosen when the SecurID was initially assigned) concatenated with the random number displayed at the time being forms the password, which is used to authenticate to the server. Because the clock on the SecurID token and that on the server are independent, the cumulative effect of clock drift would result in the number generated from the token to be out of sequence compared to the number generated on the server. Thus the server side employees some kind of algorithm to periodically adjust the actual pseduo-random number generated based on the actual number presented from the SecurID.
Watch:
Have an amazing project to share? The Electronics Show and Tell is every Wednesday at 7:30pm ET! To join, head over to YouTube and check out the show’s live chat and our Discord!
Python for Microcontrollers – Adafruit Daily — Python on Microcontrollers Newsletter: A New Arduino MicroPython Package Manager, How-Tos and Much More! #CircuitPython #Python #micropython @ThePSF @Raspberry_Pi
EYE on NPI – Adafruit Daily — EYE on NPI Maxim’s Himalaya uSLIC Step-Down Power Module #EyeOnNPI @maximintegrated @digikey