A generic security API for symmetric key management on cryptographic devices

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Generic Security API for Symmetric Key Management on Cryptographic Devices

Security APIs are used to define the boundary between trusted and untrusted code. The security properties of existing APIs are not always clear. In this paper, we give a new generic API for managing symmetric keys on a trusted cryptographic device. We state and prove security properties for our API. In particular, our API offers a high level of security even when the host machine is controlled ...

متن کامل

On the Round Security of Symmetric-Key Cryptographic Primitives

We put forward a new model for understanding the security of symmetric-key primitives, such as block ciphers. The model captures the fact that many such primitives often consist of iterating simpler constructs for a number of rounds, and may provide insight into the security of such designs. We completely characterize the security of four-round Luby-Rackoff ciphers in our model, and show that t...

متن کامل

Distributed Cryptographic Key Management for Mobile Agent Security

The problem of securing data section in a mobile agent from discovery and exploitation by a malicious host is a difficult task. A full scale adaptation of mobile agents becomes true once the security obstacles are overcome. A number of solutions are proposed based on cryptographic principles have their own limitations. The cryptographic key generation and distribution mechanism strongly holds t...

متن کامل

On Certain Approaches for Analysis and Design of Cryptographic Techniques for Symmetric Encryption and Key Management

This chapter yields a review of certain mathematical approaches for analysis and design of the basic cryptographic elements for establishing information security in information-communication systems. The following two topics are addressed: selected issues on stream ciphers for encryption and key management based on broadcast encryption. Certain coding related issues for security evaluation and ...

متن کامل

Cryptographic Key Management Concepts

83.2 Key Management Myths .................................................... 1070 Myth 1: A Key Qualifies as “Randomly Generated” If One or More Persons Create the Key Components from Their Imagination † Myth 2: An “Authorized” Person Can Create or Enter Cryptographic Keys without Compromising a Key † Myth 3: Requiring a Second Person to Supervise or Observe the Key Entry Process Is Dual Cont...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information and Computation

سال: 2014

ISSN: 0890-5401

DOI: 10.1016/j.ic.2014.07.010