A Generic Security API for Symmetric Key Management on Cryptographic Devices

被引:0
|
作者
Cortier, Veronique [1 ]
Steel, Graham [2 ]
机构
[1] CNRS, LORIA, Projet Cassis, F-75700 Paris, France
[2] CNRS & INRIA, ENS, Lab Specificat & Verificat, Paris, France
来源
COMPUTER SECURITY - ESORICS 2009, PROCEEDINGS | 2009年 / 5789卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security A Ills are used to define the boundary between trusted and untrusted code. The security properties of existing APIs are not always clear. In this paper, we give a now generic API for managing symmetric keys on a trusted cryptographic device. We state and prove security properties for our AFT In particular, our API offers a, high level of security even when the host machine is controlled by an attacker. Our API is generic in the sense that it, can implement a wide variety of (symmetric key) protocols. As a proof of concept, we give an algorithm for automatically instantiating the API commands for a given key management protocol. We demonstrate the algorithm on a set of key establishment protocols from the Clark-Jacob suite.
引用
收藏
页码:605 / +
页数:2
相关论文
共 50 条
  • [1] A generic security API for symmetric key management on cryptographic devices
    Cortier, Veronique
    Steel, Graham
    INFORMATION AND COMPUTATION, 2014, 238 : 208 - 232
  • [2] Classical and Physical Security of Symmetric Key Cryptographic Algorithms
    Baksi, Anubhab
    PROCEEDINGS OF THE 2021 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2021, : 186 - 187
  • [3] On the round security of symmetric-key cryptographic primitives
    Ramzan, Z
    Reyzin, L
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 376 - 393
  • [4] A symmetric neural cryptographic key generation scheme for Iot security
    Sarkar, Arindam
    APPLIED INTELLIGENCE, 2023, 53 (08) : 9344 - 9367
  • [5] A symmetric neural cryptographic key generation scheme for Iot security
    Arindam Sarkar
    Applied Intelligence, 2023, 53 : 9344 - 9367
  • [6] Efficient key management methods for symmetric cryptographic algorithm
    Sreehari, K. N.
    2018 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC 2018), 2018, : 377 - 380
  • [7] Towards A Scalable Symmetric Key Cryptographic Scheme: Performance Evaluation and Security Analysis
    Kholidy, Hisham A.
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [8] Cloud Security Architecture Based on User Authentication and Symmetric Key Cryptographic Techniques
    Wani, Abdul Raoof
    Rana, Q. P.
    Pandey, Nitin
    2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2017, : 529 - 534
  • [9] A cryptographic key management solution for HIPAA privacy/security regulations
    Lee, Wei-Bin
    Lee, Chien-Ding
    IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2008, 12 (01): : 34 - 41
  • [10] SECURITY FEATURES COMPARISON OF MASTER KEY AND IKM CRYPTOGRAPHIC KEY MANAGEMENT FOR RESEARCHERS AND DEVELOPERS
    Yazdanpanah, Saeed
    Chaeikar, Saman Shojae
    Zamani, Mazdak
    Kourdi, Reza
    PROCEEDINGS OF THE 2011 3RD INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGY AND ENGINEERING (ICSTE 2011), 2011, : 365 - 369