Implementation of a Provably Secure, Smartcard-Based Key Distribution Protocol
نویسندگان
چکیده
We describe the implementation of the Shoup-Rubin key distribution protocol. This protocol stores long-term keys on a smartcard and uses the cryptographic capability of the card to generate and distribute session keys securely. The designers of the protocol provide a mathematical proof of its security, using techniques pioneered by Bellare and Rogaway. Combining this theoretical strength with our implementation on tamper resistant hardware results in practical and powerful middleware functionality, useful in applications that demand strong authentication and confidentiality.
منابع مشابه
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملArtemia: a family of provably secure authenticated encryption schemes
Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...
متن کاملProvably Secure Videoconferencing
At the Center for Information Technology Integration, we are experimenting with algorithms and protocols for building secure applications. In our security testbed, we have modified VIC, an off-the-shelf videoconferencing application, to support GSS API, a generic security interface. We then layered these interfaces onto a smartcard-based key distribution algorithm and a fast cipher. These compo...
متن کاملEstablishing secure links in low-rate wireless personal area networks
This paper presents a provably secure and efficient key agreement protocol (SNKE) using private key authentication. The distinguishing features of protocol SNKE are: (a) ease of implementation in the 802.15.4 stack (it makes use of the cryptographic services provided by the media access layer); (b) availability of two operation modes (hash-chain and key-renewal modes) with forward secrecy achie...
متن کاملBEAST: A Fast Block Cipher for Arbitrary Blocksizes
This paper describes BEAST, a new blockcipher for arbitrary size blocks. It is a Luby-Rackoo cipher and fast when the blocks are large. BEAST is assembled from cryptographic hash functions and stream ciphers. It is provably secure if these building blocks are secure. For smartcard applications, a variant BEAST-RK is proposed, where the bulk operations can be done by the smartcard's host without...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1998