Kerry Wong conducts a teardown of a SecurID token, which includes a unique epoxy/glue method of assembly and also a protection mechanism that somehow detects when the token has been tampered with.
These RSA SecurID tokens basically are just pseudo-random number generators. Each token displays a random number from the sequence predetermined by the seed value and the algorithm every minute. During authentication, the user selected passcode (typically chosen when the SecurID was initially assigned) concatenated with the random number displayed at the time being forms the password, which is used to authenticate to the server. Because the clock on the SecurID token and that on the server are independent, the cumulative effect of clock drift would result in the number generated from the token to be out of sequence compared to the number generated on the server. Thus the server side employees some kind of algorithm to periodically adjust the actual pseduo-random number generated based on the actual number presented from the SecurID.
Have an amazing project to share? Join the SHOW-AND-TELL every Wednesday night at 7:30pm ET on Google+ Hangouts.
Join us every Wednesday night at 8pm ET for Ask an Engineer!
Learn resistor values with Mho’s Resistance or get the best electronics calculator for engineers “Circuit Playground” – Adafruit’s Apps!
Maker Business — Transforming Today’s Bad Jobs into Tomorrow’s Good Jobs
Wearables — Make it snow
Electronics — Pseudodifferential Measurement
Biohacking — Soft Artificial Human Heart #3DThursday #3DPrinting
No comments yet.
Sorry, the comment form is closed at this time.