Enhance Opensst Protocol's Security with Smart Card

نویسندگان

  • Xinhua Zhang
  • Alexandre Dulaunoy
  • Christoph Meinel
چکیده

As an open source project, Open Simple Secure Transaction (OpenSST) protocol aims to be a secure and transactionoriented protocol for the unsecured network. At present a prototypes has been implemented. In this paper, we give firstly an overview of OpenSST, and then we describe the key store and authentication mechanism of the prototype, as well as make an analysis on its security. Then we introduce a security-enhanced model based on this prototype, which integrates Smart Card into the OpenSST protocol. This model demonstrates how to use Smart Card to improve the public key authentication process in a secure network protocol.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Security Improved OpenSST Prototype Combining with Smart Card

Open Simple Secure Transaction (OpenSST) protocol aims to be a secure and transaction-oriented protocol for the unsecured network. OpenSST is a open source project, at present a simple prototype based on HTTP protocol has been implemented. In this paper, we give firstly an overview of openSST, and then we describe the basic architecture of this prototype, as well as make an analysis on its secu...

متن کامل

A Generic Framework to Enhance Two-Factor Authentication in Cryptographic Smart-card Applications

Today, most authenticating applications using passwords are being compromised and the risk is becoming higher because it's becoming easier to download tools that will crack them. Passwords are no longer sufficient, as threats against them increase in large quantity. With the growing use of internet to access information resources, government and private agencies are now moving to replace passwo...

متن کامل

Session Key Distribution Using Smart Cards

In this paper, we investigate a method by which smart cards can be used to enhance the security of session key distribution in the third-party setting of Needham & Schroeder. We extend the security model of Bellare & Rogaway to take into account both the strengths and weaknesses of smart card technology, we propose a session key distribution protocol, and we prove that it is secure assuming pse...

متن کامل

Survey on Biometric Applications for Implementation of Authentication in Smart Governance

With large scale proliferation of internet and network, more and more people tend to communicate through the insecure network channels. So, to avoid illegal access of confidential and private resources, user authentication is the primary requirement of this age. Nowadays, smart card based authentication schemes have been deployed widely to ensure the legitimacy of a user‟s access request. Smart...

متن کامل

Improving the Password-Based Authentication against Smart Card Security Breach

Password-based authentications using smart cards are very necessary between login users and a remote server. Smart card security breach threatens the security of password-based authentication schemes with smart cards. A password-based authentication scheme with smart cards against smart card security breach was proposed by C.T. Li et al. recently. However, it is noted that Li et al.'s scheme ne...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003