An Asymmetric Cryptography Secure Channel Protocol for Smart Cards

نویسندگان

  • Konstantinos Rantos
  • Konstantinos Markantonakis
چکیده

Smart eard seeure ehannel protocols based on publie key eryptography are not widely utilised mainly due to proeessing overheads introdueed in the underlying smart eard microproeessors and the complexities introdueed by the operation of a PKI infrastructure, In this paper we analyse the signifieanee of publie key seeure ehannel protoeols in multi applieation smart eards. We believe that multi applieation smart eard teehnology (e.g. the GlobaIPlatform smart eard specifieation) should benefit more from the advantages of publie key eryptography specifically for the initiation and maintenance of aseeure ehannel. This paper introduees a publie key based eryptographic protocol for seeure entity authentication, data integrity and data confidentiality. The proposed seeure channel protocol uses a combination of publie key, seeret key and the main idea behind the Diffie-Hellmann key establishment protoeols in order to achieve the desired goals.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Secure Channel Protocol for Multi-Application Smart Cards Based on Public Key Cryptography

Smart card secure channel protocols based on public key cryptography are not widely utilised mainly due to processing overheads introduced in the underlying smart card microprocessors and the complexities introduced by the operation of a PKI infrastructure. In this paper we analyse the significance of public key secure channel protocols in multi-application smart cards. We believe that multi-ap...

متن کامل

A password-authenticated secure channel for App to Java Card applet communication

The usage of security and privacy sensitive systems on mobile devices, such as mobile banking, mobile credit cards, mobile ticketing, or mobile digital identities, has continuously risen in recent years. This development makes the protection of personal and security sensitive data on mobile devices more important than ever. A common approach for the protection of sensitive data is to use additi...

متن کامل

Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography

Pairings are mathematical tools that have been proven to be very useful in the construction of many cryptographic protocols. Some of these protocols are suitable for implementation on power constrained devices such as smart cards or smartphone which are subject to side channel attacks. In this paper, we analyse the efficiency of the point blinding countermeasure in pairing based cryptography ag...

متن کامل

Designing a Secure Smart Card Operating System

The ever-increasing computational power of smart cards has made them feasible for applications like electronic passports and military id cards. However, these applications require a secure smart card operating system. In this paper we argue that smart card platforms pose additional security challenges than traditional computer platforms. We discuss our design for a secure smart card operating s...

متن کامل

Presentation of a Two-Party Key Agreement Protocol based on Chaos

One of the most important cryptography protocols is the key agreement protocol in which used to build a shared secret key between two participants through an insecure channel. To increase the security and efficiency of these protocols, many researches have been performed. Recently, in 2012, Lee et al. proposed a key agreement protocol using smart cards and claimed their protocol is secure and e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004