1
0
Fork 0
mirror of https://github.com/google/OpenSK.git synced 2025-12-04 16:25:51 -05:00
No description
Find a file
2025-11-26 11:48:52 +01:00
.github Start measuring coverage in fingerprint code (#751) 2025-08-05 16:02:49 +02:00
boards/nordic Fix USB enumeration on OS X (#640) 2023-07-26 14:21:55 +02:00
bootloader Bumps dependencies to fix cargo audit (#727) 2025-04-08 11:06:28 +02:00
docs More linear flow in the install instructions (#744) 2025-07-28 14:19:02 +02:00
examples Removes unused ECB from AES (#761) 2025-11-26 11:48:52 +01:00
libraries Removes unused ECB from AES (#761) 2025-11-26 11:48:52 +01:00
maintainers Also restore index for check 2022-06-22 11:26:02 +02:00
metadata Updates the metadata to MDS 3 (#655) 2023-11-08 00:45:39 +01:00
patches Refactors HID connections to support busy response (#699) 2024-09-05 15:07:43 +02:00
reproducible Changed reproducible 2020-10-09 15:15:22 +00:00
rules.d Initial commit 2020-01-30 11:47:29 +01:00
src Fingerprints are stored even on beginEnroll (#752) 2025-08-06 12:32:12 +02:00
third_party Refactors HID connections to support busy response (#699) 2024-09-05 15:07:43 +02:00
tools Fixes pylint by adjusting quotes (#721) 2025-03-14 11:18:51 +01:00
.gitignore Commits Cargo.lock files for library (#730) 2025-06-05 16:02:13 +02:00
.gitmodules Ignore dirty submodules 2020-11-30 08:46:02 -08:00
.markdownlint.json Fixes the Markdown lint config and affected files (#676) 2024-01-12 16:00:37 +01:00
.pylintrc Version string for CTAP 2.1 (#590) 2023-02-08 09:20:59 +01:00
build.rs Tock V2 port - rebased and updated (#620) 2023-05-05 09:55:16 +02:00
Cargo.lock Ed25519 in Env (#740) 2025-07-23 09:52:05 +02:00
Cargo.toml Makes RustCrypto dependencies optional (#741) 2025-07-23 12:52:55 +02:00
CITATION.cff Reworks the README (#659) 2023-11-08 16:59:49 +01:00
deploy.py Correct the type annotations (#728) 2025-05-11 14:22:32 +02:00
fuzzing_setup.sh roll back fuzzing install script, documentation instead (#439) 2022-03-08 03:09:48 +01:00
libtock_layout.ld Tock V2 port - rebased and updated (#620) 2023-05-05 09:55:16 +02:00
LICENSE Initial commit 2020-01-30 11:47:29 +01:00
nrf52840_layout.ld Tock V2 port - rebased and updated (#620) 2023-05-05 09:55:16 +02:00
nrf52840_layout_a.ld Tock V2 port - rebased and updated (#620) 2023-05-05 09:55:16 +02:00
nrf52840_layout_b.ld Tock V2 port - rebased and updated (#620) 2023-05-05 09:55:16 +02:00
OpenSK.code-workspace Use a vscode workspace instead of local settings. 2020-12-10 10:02:48 +01:00
README.md Mention the Wasefire applet in the README (#753) 2025-08-07 14:16:06 +02:00
requirements.txt Reworks workflows into script (#661) 2023-11-08 17:24:15 +01:00
reset.sh Install elf2tab in its own directory. 2020-09-29 12:56:21 +02:00
run_desktop_tests.sh Fixes clippy warnings from nightly (#747) 2025-08-05 10:10:09 +02:00
rust-toolchain.toml Replaces libraries/crypto with RustCrypto (#722) 2025-03-14 17:30:35 +01:00
rustfmt.toml enforces Module imports granularity (#445) 2022-03-14 20:44:48 +01:00
SECURITY.md adds and links new security policy 2021-07-09 11:52:16 +02:00
setup-submodules.sh Do not set the stack size outside prod (#415) 2021-11-30 18:11:42 +01:00
setup.sh Change PKI so that attestation certs are fully compliant. (#668) 2023-12-18 10:47:46 +01:00

OpenSK logo

markdownlint pylint Cargo check Cargo format Coverage Status

News:

OpenSK

This repository contains a Rust implementation of a FIDO2 security key. Security keys are external devices that can be used for signing in on websites. You can see OpenSK in action in this video on YouTube!

We intend to bring a full open source experience to security keys, from application to operating system. You can even 3D print your own open source enclosure!

OpenSK Enclosure

You can run OpenSK:

You are viewing the branch for developers. New features are developed here. Go to the default branch for a more stable version of OpenSK.

FIDO2

OpenSK's version that implemented CTAP 2.0 was certified by the FIDO Alliance.

The develop branch tracks the latest release version of the CTAP specification. This branch is not FIDO certified. OpenSK supports U2F, and non-discoverable credentials created with either protocol are compatible with the other.

⚠️ Disclaimer

This is not an officially supported Google product.

This project is proof-of-concept and a research platform. It is NOT meant for a daily usage. This branch is under development, and therefore less rigorously tested than the numbered branches.

We're still in the process of integrating the ARM® CryptoCell-310 embedded in the Nordic nRF52840 chip to enable hardware-accelerated cryptography. In the meantime, we use RustCrypto.

Hardware

You will need one the following supported boards:

Installation

To install OpenSK,

  1. follow the general setup steps,
  2. then continue with the instructions for your specific hardware:

To test whether the installation was successful, visit a demo website and try to register and login. Please check our Troubleshooting and Debugging section if you have problems with the installation process or during development. To find out what else you can do with your OpenSK, see Customization.

Research

We implemented post-quantum cryptography on OpenSK. The code is released under the hybrid-pqc tag. Our paper was published in the ACNS Secure Cryptographic Implementation workshop 2023 and won the best paper award.

Bibtex reference
@InProceedings{Ghinea2023hybrid,
    author= {Diana Ghinea and Fabian Kaczmarczyck and Jennifer Pullman and Julien Cretin and Rafael Misoczki and Stefan Kölbl and Luca Invernizzi and Elie Bursztein and Jean-Michel Picod},
    title=  {{Hybrid Post-Quantum Signatures in Hardware Security Keys}},
    booktitle=  {{4th ACNS Workshop on Secure Cryptographic Implementation, Kyoto, Japan}},
    month=  {June},
    year=   {2023},
}

Contributing

See Contributing.md.

Reporting a Vulnerability

See SECURITY.md.