An Asymmetric Cryptography Secure Channel Protocol for Smart Cards
نویسندگان
چکیده
Smart eard seeure ehannel protocols based on publie key eryptography are not widely utilised mainly due to proeessing overheads introdueed in the underlying smart eard microproeessors and the complexities introdueed by the operation of a PKI infrastructure, In this paper we analyse the signifieanee of publie key seeure ehannel protoeols in multi applieation smart eards. We believe that multi applieation smart eard teehnology (e.g. the GlobaIPlatform smart eard specifieation) should benefit more from the advantages of publie key eryptography specifically for the initiation and maintenance of aseeure ehannel. This paper introduees a publie key based eryptographic protocol for seeure entity authentication, data integrity and data confidentiality. The proposed seeure channel protocol uses a combination of publie key, seeret key and the main idea behind the Diffie-Hellmann key establishment protoeols in order to achieve the desired goals.
منابع مشابه
A Secure Channel Protocol for Multi-Application Smart Cards Based on Public Key Cryptography
Smart card secure channel protocols based on public key cryptography are not widely utilised mainly due to processing overheads introduced in the underlying smart card microprocessors and the complexities introduced by the operation of a PKI infrastructure. In this paper we analyse the significance of public key secure channel protocols in multi-application smart cards. We believe that multi-ap...
متن کاملA password-authenticated secure channel for App to Java Card applet communication
The usage of security and privacy sensitive systems on mobile devices, such as mobile banking, mobile credit cards, mobile ticketing, or mobile digital identities, has continuously risen in recent years. This development makes the protection of personal and security sensitive data on mobile devices more important than ever. A common approach for the protection of sensitive data is to use additi...
متن کاملFailure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography
Pairings are mathematical tools that have been proven to be very useful in the construction of many cryptographic protocols. Some of these protocols are suitable for implementation on power constrained devices such as smart cards or smartphone which are subject to side channel attacks. In this paper, we analyse the efficiency of the point blinding countermeasure in pairing based cryptography ag...
متن کاملDesigning a Secure Smart Card Operating System
The ever-increasing computational power of smart cards has made them feasible for applications like electronic passports and military id cards. However, these applications require a secure smart card operating system. In this paper we argue that smart card platforms pose additional security challenges than traditional computer platforms. We discuss our design for a secure smart card operating s...
متن کاملPresentation of a Two-Party Key Agreement Protocol based on Chaos
One of the most important cryptography protocols is the key agreement protocol in which used to build a shared secret key between two participants through an insecure channel. To increase the security and efficiency of these protocols, many researches have been performed. Recently, in 2012, Lee et al. proposed a key agreement protocol using smart cards and claimed their protocol is secure and e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004