Enhance Opensst Protocol's Security with Smart Card
نویسندگان
چکیده
As an open source project, Open Simple Secure Transaction (OpenSST) protocol aims to be a secure and transactionoriented protocol for the unsecured network. At present a prototypes has been implemented. In this paper, we give firstly an overview of OpenSST, and then we describe the key store and authentication mechanism of the prototype, as well as make an analysis on its security. Then we introduce a security-enhanced model based on this prototype, which integrates Smart Card into the OpenSST protocol. This model demonstrates how to use Smart Card to improve the public key authentication process in a secure network protocol.
منابع مشابه
A Security Improved OpenSST Prototype Combining with Smart Card
Open Simple Secure Transaction (OpenSST) protocol aims to be a secure and transaction-oriented protocol for the unsecured network. OpenSST is a open source project, at present a simple prototype based on HTTP protocol has been implemented. In this paper, we give firstly an overview of openSST, and then we describe the basic architecture of this prototype, as well as make an analysis on its secu...
متن کاملA Generic Framework to Enhance Two-Factor Authentication in Cryptographic Smart-card Applications
Today, most authenticating applications using passwords are being compromised and the risk is becoming higher because it's becoming easier to download tools that will crack them. Passwords are no longer sufficient, as threats against them increase in large quantity. With the growing use of internet to access information resources, government and private agencies are now moving to replace passwo...
متن کاملSession Key Distribution Using Smart Cards
In this paper, we investigate a method by which smart cards can be used to enhance the security of session key distribution in the third-party setting of Needham & Schroeder. We extend the security model of Bellare & Rogaway to take into account both the strengths and weaknesses of smart card technology, we propose a session key distribution protocol, and we prove that it is secure assuming pse...
متن کاملSurvey on Biometric Applications for Implementation of Authentication in Smart Governance
With large scale proliferation of internet and network, more and more people tend to communicate through the insecure network channels. So, to avoid illegal access of confidential and private resources, user authentication is the primary requirement of this age. Nowadays, smart card based authentication schemes have been deployed widely to ensure the legitimacy of a user‟s access request. Smart...
متن کاملImproving the Password-Based Authentication against Smart Card Security Breach
Password-based authentications using smart cards are very necessary between login users and a remote server. Smart card security breach threatens the security of password-based authentication schemes with smart cards. A password-based authentication scheme with smart cards against smart card security breach was proposed by C.T. Li et al. recently. However, it is noted that Li et al.'s scheme ne...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003