Should I buy a USB, Bluetooth or NFC security key?
What is a security key?
It may seem odd to use a physical key to log into a device or access a program, but that's exactly what a security key does. A computer security key is a pocket-sized key that provides encryption, authentication, and authorization services. After you log into your account with your username and password, you'll use the key to perform multi-factor authentication.
Features | FIDO U2F | FIDO2 (WebAuthn + CTAP) |
---|---|---|
Authentication Type | Second factor authentication (requires password + security key) | Passwordless authentication (supports both two-factor authentication and passwordless login) |
Main use cases | Enhance security by adding an extra layer (2FA) | Passwordless login, strong multi-factor authentication, and advanced security across multiple devices |
Cryptographic method | Public key encryption with ECC (NIST P-256) | Public key encryption with ECC (NIST P-256) or RSA (2048 bit or longer) |
Hash function | SHA-256 | SHA-256 |
Encryption | Mainly use ECC to deliver request information | Use ECC to pass request information and AES to encrypt communication (in some implementations) |
Device verification | Not explicitly supported | Supported to prove device authenticity |
Supported Protocols | FIDO U2F | FIDO2 (WebAuthn for browsers, CTAP for authenticators) |
Backward compatibility | N/A | Backward compatible with FIDO U2F keys |
Authentication Flow | Challenge-response (give requested information with private key) | Challenge-response (supports both challenge-response and confirmation) |
Supported Devices | Mainly desktop browsers and some mobile devices | Multiple browsers, mobile devices, platforms and apps |
Security benefits | Protection against Phishing and Man-in-the-middle attacks | Protection against Phishing and Man-in-the-middle attacks, credential theft; supports device authentication |
Security keys are secure in part because they use Fast Identity Online (FIDO) technology. FIDO is a set of protocols designed to work with passwords during authentication. With FIDO, you don't need to remember dozens of passwords or even use a password manager to log in. With passwordless authentication, you just enter and tap your security key to authenticate.
All FIDO protocols use public key cryptography for authentication. This type of encryption uses two keys to protect data: a public key and a private key. Your private key decrypts information and is not shared.
Unfortunately, it is not possible to use physical security keys to authenticate every account. Although this technology has existed since 2008, it is still being adopted at a slow pace.
There are three types of security locks. While each type of lock is extremely secure, some offer more security than others.
USB Security Key
USB security keys are the most secure of all the keys. By being physically attached to your computer, the chances of the data being sent being intercepted by someone eavesdropping on your network are much lower. Even if a cyber-spy were to capture the data being sent using your physical key, they would still need to go through the arduous task of decrypting it. Brute-Forcing a FIDO-compliant USB security key can take a very long time, depending on the length of the key.
NFC Security Key
NFC stands for near field communication. While you may have never heard of NFC, you use it every time you tap to pay with a credit card or phone. The same technology is also in computer security keys. For NFC to work, you need to be within about 2 inches of the device you are trying to communicate with. This means that in order to pick up the signal, the intruder would have to be very close to you.
While this is unlikely, it is possible. However, keep in mind that FIDO-compliant security keys use extremely strong encryption, so even if this data is intercepted, you still have to decrypt it. If the private key is compromised, the NFC protocol makes it difficult to impersonate the user by requiring both parties to verify their identity before sending sensitive information, while encrypting the physical security key makes it extremely difficult to compromise your data.
While NFC hardware security keys are extremely secure, the good news is that most NFC-enabled security keys also offer USB connectivity.
Bluetooth Security Key
We use Bluetooth when sharing files and connecting to speakers, and now we can use it when authenticating with a security key. At first glance, Bluetooth may seem insecure because of its 33-foot broadcast radius. While this poses a very low risk of man-in-the-middle attacks, the chances of your information being stolen are extremely small. Hardware security keys use a Bluetooth Secure Simply Pairing mechanism designed to address the man-in-the-middle attacks that made older pairing mechanisms vulnerable.
Even if a hacker defies all odds and intercepts your private key, current computing power makes it impossible to decrypt it. Hackers can intercept whatever they want, but the data they collect is useless if they can't decrypt the cipher.
While each type of security lock has its own pros and cons, it's important to remember that each is extremely secure. Using any of these locks ensures that your information is kept safe — unless, of course, you lose the lock.
You should read it
- How secure is Bluetooth?
- The 'Bluetooth 4.2' technology standard was released
- Learn about Bluetooth technology
- Detection of security vulnerabilities affects all Bluetooth versions
- iPhone and Android smartphone series stick with serious Bluetooth security error
- Face some new hacking techniques related to Bluetooth technology
- Desktop without Bluetooth? This is the solution
- Warning: Turn off Bluetooth immediately to avoid security threats
- A new security flaw allowed to impersonate Bluetooth peripherals
- Discovering more vulnerabilities makes Bluetooth devices vulnerable to malicious attacks
- What is Bluetooth 5.0? What benefits does it have for our lives?
- Instructions for using Bluetooth on devices
Maybe you are interested
iPhone security tips you're missing out on
This list of common passwords shows how little we understand about online security
Download free Windows Server 2025 security guide
5 Misconceptions About Password Security
4 Security Steps to Follow When Using Remote Access Applications
Series of DrayTek router models have security holes