Limitations Regarding Certificate Handling on Smart Cards
نویسنده
چکیده
A public-key infrastructure (PKI) typically requires use of tamper-proof devices that can perform crypto computations and store highly sensitive data like private keys. Smart cards are the low cost devices that satisfy these requirements and, as a result, they can boost the wide deployment of a PKI. Yet certain limitations exist regarding the handling of certificates, one of the supporting mechanisms of an infrastructure, from these limited capabilities devices. This paper addresses these issues and shows why smart cards are not the panacea to public key technology deployment.
منابع مشابه
On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation
The use of certificates for secure transactions in smart cards requires the existence of a secure and efficient revocation protocol residing on the card. There are a number of existing protocols for online certificate validation, among which OCSP and SCVP are the most widely used. However there are not any real applications testing the efficiency of these protocols when run in a smart card, eve...
متن کاملApplication of the B formal method to the proof of a type verification algorithm
Smart cards are credit-card sized devices embedding a microprocessor. They are typically used to provide security to an information system. Open cards are smart cards able to download code after their issuance. The card security is usually ensured by a third party that sends a cryptographic certificate with the code to authenticate it. On-card code verification could be a solution for improving...
متن کاملCryptoNET: Integrated Secure Workstation
In most of the current applications security is usually provided individually. This means that various applications use their own security mechanisms and services, applied only to their own resources and functions. Furthermore, procedures to configure security parameters are usually inconvenient and complicated for non-technical users. As an alternative to this approach, we have designed and im...
متن کاملSecurity Infrastructure Requirements for Electronic Health Cards Communication
Communication and co-operation processes in the healthcare and welfare domain require a security infrastructure based on services describing status and relation of communicating principals as well as corresponding keys and attributes. Additional services provide trustworthy information on dynamic issues of communication and co-operation such as time and location of processes, workflow relations...
متن کاملA New Paradigm in PKI Architecture: OTPK Technology For Online Digital Signature
In this paper, we present a paradigm shift in PKI architectures. The OTPK concept is alarmingly simple to understand. Whenever a digital signature is required, the private key is generated, certified, used to compute the digital signature and immediately deleted. All that remains is the digital signature and the public key certificate from the Certification Authority (CA) that is used to verify...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005