A Generic Security API for Symmetric Key Management on Cryptographic Devices

被引:0
|
作者
Cortier, Veronique [1 ]
Steel, Graham [2 ]
机构
[1] CNRS, LORIA, Projet Cassis, F-75700 Paris, France
[2] CNRS & INRIA, ENS, Lab Specificat & Verificat, Paris, France
来源
COMPUTER SECURITY - ESORICS 2009, PROCEEDINGS | 2009年 / 5789卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security A Ills are used to define the boundary between trusted and untrusted code. The security properties of existing APIs are not always clear. In this paper, we give a now generic API for managing symmetric keys on a trusted cryptographic device. We state and prove security properties for our AFT In particular, our API offers a, high level of security even when the host machine is controlled by an attacker. Our API is generic in the sense that it, can implement a wide variety of (symmetric key) protocols. As a proof of concept, we give an algorithm for automatically instantiating the API commands for a given key management protocol. We demonstrate the algorithm on a set of key establishment protocols from the Clark-Jacob suite.
引用
收藏
页码:605 / +
页数:2
相关论文
共 50 条
  • [21] Reliability Analysis for Cryptographic Key Management
    Xiao, Sheng
    Gong, Weibo
    Towsley, Don
    Zhang, Qingquan
    Zhu, Ting
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 999 - 1004
  • [22] ON A CERTAIN MODEL OF CRYPTOGRAPHIC KEY MANAGEMENT
    Nyssanbayeva, S. E.
    Kapalova, N. A.
    Haumen, A.
    EURASIAN JOURNAL OF MATHEMATICAL AND COMPUTER APPLICATIONS, 2020, 8 (04): : 15 - 22
  • [23] A portable hardware security module and cryptographic key generator
    Murtaza, Malik Hamza
    Tahir, Hasan
    Tahir, Shahzaib
    Alizai, Zahoor Ahmed
    Riaz, Qaiser
    Hussain, Mehdi
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 70
  • [24] GGSS-API: A group enhanced generic security service
    Hutchison, CM
    INFORMATION SECURITY IN RESEARCH AND BUSINESS, 1997, : 101 - 110
  • [25] Cryptographic key protection against FROST for mobile devices
    Zhang, Xiaosong
    Tan, Yu-an
    Xue, Yuan
    Zhang, Quanxin
    Li, Yuanzhang
    Zhang, Can
    Zheng, Jun
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (03): : 2393 - 2402
  • [26] A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case
    Shrimpton, Thomas
    Stam, Martijn
    Warinschi, Bogdan
    ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 : 277 - 307
  • [27] Cryptographic key protection against FROST for mobile devices
    Xiaosong Zhang
    Yu-an Tan
    Yuan Xue
    Quanxin Zhang
    Yuanzhang Li
    Can Zhang
    Jun Zheng
    Cluster Computing, 2017, 20 : 2393 - 2402
  • [28] Symmetric and asymmetric cryptographic key exchange protocols in the octonion algebra
    Z. Lipiński
    Applicable Algebra in Engineering, Communication and Computing, 2021, 32 : 81 - 96
  • [29] RASS - A Concurrency Based Bitwise Symmetric Key Cryptographic Algorithm
    Roy, Abhriya
    Ray, Ronit
    De, Saptarshi
    Guha, Shalini
    Goswami, Sukalyan
    Basak, Ratan Kumar
    Mukhopadhyay, Bipasha
    Chatterjee, Souvik
    Zaman, Amrin
    Nag, Sucheta
    2016 IEEE 7TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS MOBILE COMMUNICATION CONFERENCE (UEMCON), 2016,
  • [30] Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols
    Aly, Abdelrahaman
    Ashur, Tomer
    Ben-Sasson, Eli
    Dhooghe, Siemen
    Szepieniec, Alan
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 (03) : 1 - 45