Skip to content

Slot: Challenge-Response

This page describes the Challenge-Response slot type available in PicoKeyApp.

This slot implements a host-driven challenge–response mechanism, where the host generates a challenge, the device signs it, and the host verifies the response.

Challenge-Response slot


Overview

The Challenge-Response slot is designed to:

  • Bind authentication to a secret stored on the device
  • Require host-side verification
  • Avoid storing reusable secrets on the host

The authentication flow is driven by the host application.


Authentication model

The Challenge-Response mechanism works as follows:

  • The host generates a random challenge
  • The challenge is sent to the device
  • The device signs or processes the challenge using the slot secret
  • The response is returned to the host
  • The host verifies the response
  • Authentication succeeds only if the response matches the expected value

Note

The device does not decide whether authentication succeeds. Validation is entirely performed by the host.


Slot configuration

Key

Defines the secret key used for challenge processing.

  • The key is stored securely on the device
  • The key length is limited by the slot implementation
  • Once configured, the key cannot be retrieved in plaintext

Warning

Losing the key means the challenge-response authentication cannot be validated anymore.


Require touch

When enabled:

  • User presence is required to generate a response
  • The device waits for a physical touch or confirmation

Note

Requiring touch prevents unattended or automated authentication attempts.


Save and cancel

  • Save stores the slot configuration permanently
  • Cancel discards all changes

Danger

Saving overwrites any existing slot configuration.


Security properties

The Challenge-Response slot provides:

  • Protection against replay attacks (if challenges are random)
  • No static secrets sent over the interface
  • Optional user presence enforcement

Warning

Security depends entirely on correct challenge generation and verification on the host side.


Typical use cases

Common uses for Challenge-Response slots include:

  • Device-bound authentication for custom applications
  • Licensing or entitlement checks
  • Secure device identification
  • Anti-cloning mechanisms

Tip

Always use cryptographically strong random challenges.


Limitations

  • No built-in verification on the device
  • No standardized protocol (application-specific)
  • Host implementation is required

Note

This slot is intended for advanced users and custom integrations.