Limitations Regarding Certificate Handling on Smart Cards

نویسنده

  • Konstantinos Rantos
چکیده

A public-key infrastructure (PKI) typically requires use of tamper-proof devices that can perform crypto computations and store highly sensitive data like private keys. Smart cards are the low cost devices that satisfy these requirements and, as a result, they can boost the wide deployment of a PKI. Yet certain limitations exist regarding the handling of certificates, one of the supporting mechanisms of an infrastructure, from these limited capabilities devices. This paper addresses these issues and shows why smart cards are not the panacea to public key technology deployment.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation

The use of certificates for secure transactions in smart cards requires the existence of a secure and efficient revocation protocol residing on the card. There are a number of existing protocols for online certificate validation, among which OCSP and SCVP are the most widely used. However there are not any real applications testing the efficiency of these protocols when run in a smart card, eve...

متن کامل

Application of the B formal method to the proof of a type verification algorithm

Smart cards are credit-card sized devices embedding a microprocessor. They are typically used to provide security to an information system. Open cards are smart cards able to download code after their issuance. The card security is usually ensured by a third party that sends a cryptographic certificate with the code to authenticate it. On-card code verification could be a solution for improving...

متن کامل

CryptoNET: Integrated Secure Workstation

In most of the current applications security is usually provided individually. This means that various applications use their own security mechanisms and services, applied only to their own resources and functions. Furthermore, procedures to configure security parameters are usually inconvenient and complicated for non-technical users. As an alternative to this approach, we have designed and im...

متن کامل

Security Infrastructure Requirements for Electronic Health Cards Communication

Communication and co-operation processes in the healthcare and welfare domain require a security infrastructure based on services describing status and relation of communicating principals as well as corresponding keys and attributes. Additional services provide trustworthy information on dynamic issues of communication and co-operation such as time and location of processes, workflow relations...

متن کامل

A New Paradigm in PKI Architecture: OTPK Technology For Online Digital Signature

In this paper, we present a paradigm shift in PKI architectures. The OTPK concept is alarmingly simple to understand. Whenever a digital signature is required, the private key is generated, certified, used to compute the digital signature and immediately deleted. All that remains is the digital signature and the public key certificate from the Certification Authority (CA) that is used to verify...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005