The USB devices communicate with the hostcomputer using the human interface device protocol, essentially mimicking a keyboard. This avoids the need for the user to install special hardware driver software in the host computer, and permits application software to directly access the security features of the device without user effort other than possessing and inserting the device. Once communication is established, the application exercises a challenge–response authentication with the device using public-key cryptography methods and a secret unique device key manufactured into the device. The device key is vulnerable to malicious manufacturer duplication, and logically secured against reverse-engineering or counterfeiting by the robustness of the encryption and physical possession.
Support and use
U2F security keys are supported by Google Chrome since version 38 and Opera since version 40. U2F security keys can be used as an additional method of two-step verification on online services that support the U2F protocol, including Google,, GitHub, GitLab, Bitbucket, Nextcloud, Facebook, and others. Chrome, Firefox, and Opera were, as of 2015, the only browsers supporting U2F natively. Microsoft has enabled FIDO 2.0 support for Windows 10's Windows Hello login platform. Microsoft Edge browser gained support for U2F in the October 2018 Windows Update. Microsoft accounts, including Office 365, OneDrive, and other Microsoft services, do not yet have U2F support. Mozilla has integrated it into Firefox 57, and enabled it by default in Firefox 60 and Thunderbird 60. Microsoft Edge starting from build 17723 support FIDO2.. As of iOS and iPadOS 13.3 Apple now supports U2F in the Safari browser on those platforms.
Specifications
The U2F standard has undergone two major revisions:
U2F 1.0 Proposed Standard
U2F 1.2 Proposed Standard
Additional specification documents may be obtained from the FIDO web site. The U2F 1.0 Proposed Standard was the starting point for a short-lived specification known as the FIDO 2.0 Proposed Standard. The latter was formally submitted to the World Wide Web Consortium on November 12, 2015. Subsequently, the first Working Draft of the W3C Web Authentication standard was published on May 31, 2016. The WebAuthn standard has been revised numerous times since then, becoming a W3C Recommendation on March 4, 2019. Meanwhile the U2F 1.2 Proposed Standard became the starting point for the Client to Authenticator Protocol Proposed Standard, which was published on September 27, 2017. FIDO CTAP complements W3C WebAuthn, both of which are in scope for the FIDO2 Project. WebAuthn and CTAP provide a complete replacement for U2F, which has been renamed "CTAP1" in the latest version of the FIDO2 standard. The WebAuthn protocol is backward-compatible with U2F-only security keys but the U2F protocol is not compatible with a WebAuthn-only authenticator. Some authenticators support both U2F and WebAuthn while some WebAuthn clients support keys created via the legacy U2F API.