A Generic Security API for Symmetric Key Management on Cryptographic Devices

被引:0
作者
Cortier, Veronique [1 ]
Steel, Graham [2 ]
机构
[1] CNRS, LORIA, Projet Cassis, F-75700 Paris, France
[2] CNRS & INRIA, ENS, Lab Specificat & Verificat, Paris, France
来源
COMPUTER SECURITY - ESORICS 2009, PROCEEDINGS | 2009年 / 5789卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security A Ills are used to define the boundary between trusted and untrusted code. The security properties of existing APIs are not always clear. In this paper, we give a now generic API for managing symmetric keys on a trusted cryptographic device. We state and prove security properties for our AFT In particular, our API offers a, high level of security even when the host machine is controlled by an attacker. Our API is generic in the sense that it, can implement a wide variety of (symmetric key) protocols. As a proof of concept, we give an algorithm for automatically instantiating the API commands for a given key management protocol. We demonstrate the algorithm on a set of key establishment protocols from the Clark-Jacob suite.
引用
收藏
页码:605 / +
页数:2
相关论文
共 50 条
  • [41] A cost effective symmetric key cryptographic algorithm for small amount of data
    Sarker, Mohammad Zakir Hossain
    Parvez, Shafiul
    Proceedings of the INMIC 2005: 9th International Multitopic Conference - Proceedings, 2005, : 225 - 230
  • [42] A novel symmetric cryptographic method to design block complexity for data security
    Umapathy, B.
    Kalpana, G.
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104
  • [43] Software Metric LOC Data Analysis for Symmetric Key Cryptographic Technique
    Dhanuja, B.
    Sathiya, G.
    2017 INNOVATIONS IN POWER AND ADVANCED COMPUTING TECHNOLOGIES (I-PACT), 2017,
  • [44] Two-Key Dependent Permutation for Use in Symmetric Cryptographic System
    Kuppusamy, Arulmani
    Iyer, Swaminathan Pitchai
    Krithivasan, Kannan
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2014, 2014
  • [45] Security Enabled DSR for Establishing Symmetric Key and Security in MANETs
    Khubalkar, Aruna Sanjay
    Ragha, Lata R.
    2013 TENTH INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS (WOCN), 2013,
  • [46] Physical layer security for IoT devices configuration and key management - a Proof of Concept
    Brilli, Luca
    Pecorella, Tommaso
    Mucchi, Lorenzo
    2016 AEIT INTERNATIONAL ANNUAL CONFERENCE (AEIT) - SUSTAINABLE DEVELOPMENT IN THE MEDITERRANEAN AREA: ENERGY AND ICT NETWORKS OF THE FUTURE, 2016,
  • [47] Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software
    Dodis, Yevgeniy
    Luo, Weiliang
    Xu, Shouhuai
    Yung, Moti
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [48] Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key
    Ghani, Anwar
    Mansoor, Khwaja
    Mehmood, Shahid
    Chaudhry, Shehzad Ashraf
    Rahman, Arif Ur
    Saqib, Malik Najmus
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (16)
  • [49] Scalable cryptographic key management in wireless sensor networks
    Wadaa, A
    Olariu, S
    Wilson, L
    Eltoweissy, M
    24TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, PROCEEDINGS, 2004, : 796 - 802
  • [50] Cryptographic Key Management for SCADA Systems, Issues and Perspectives
    Pietre-Cambacedes, Ludovic
    Sitbon, Pascal
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2008, 2 (03): : 31 - 40