A generic security API for symmetric key management on cryptographic devices

被引:4
|
作者
Cortier, Veronique [1 ]
Steel, Graham [2 ]
机构
[1] CNRS, Loria, UMR 7503, F-54500 Vandoeuvre Les Nancy, France
[2] INRIA Project ProSecCo, F-75013 Paris, France
基金
欧洲研究理事会;
关键词
Security APIs; Key management; PKCS#11; Cryptographic devices; AUTHENTICATION;
D O I
10.1016/j.ic.2014.07.010
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a new symmetric key management API for cryptographic devices intended to implement security protocols in distributed systems. Our API has a formal security policy and proofs of security in the symbolic model, under various threat scenarios. This sets it apart from previous APIs such as RSA PKCS#11, which are under-specified, lack a clear security policy and are often subject to attacks. Our design is based on the principle of explicitness: the security policy for a key must be given at creation time, and this policy is then included in any ciphertext containing the key. Our API also contains novel features such as the possibility of insisting on a freshness check before accepting an encrypted key for import. To show the applicability of our design, we give an algorithm for automatically instantiating the API commands for a given key management protocol and apply it on the Clark-Jacob protocols suite. (C) 2014 Elsevier Inc. All rights reserved.
引用
收藏
页码:208 / 232
页数:25
相关论文
共 50 条
  • [21] Key management and multicast security: A survey
    Seba, H
    Bouabdallah, A
    Badache, N
    Bettahar, H
    Tandjaoui, D
    ANNALS OF TELECOMMUNICATIONS, 2003, 58 (7-8) : 1090 - 1129
  • [22] CLUSTERING KEY MANAGEMENT OF FORWARD SECURITY
    Jiang, Zhiwei
    Wei, Changjiang
    SECOND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS: ICFN 2010, 2010, : 411 - 414
  • [23] Cryptographic Key Management Methods for Mission-Critical Wireless Networks
    Li, Celia
    Yang, Cungang
    PROCEEDINGS OF 2017 IEEE 7TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC), 2017, : 33 - 36
  • [24] Mobility Based Key Management Security Scheme for Wireless Sensor Networks
    Lalitha, T.
    Jayaprabha, S.
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 87 (02) : 349 - 367
  • [25] Mobility Based Key Management Security Scheme for Wireless Sensor Networks
    T. Lalitha
    S. Jayaprabha
    Wireless Personal Communications, 2016, 87 : 349 - 367
  • [26] Simple Cryptographic Key Management Scheme of the Electronic Control Unit in the Lifecycle of a Vehicle
    Sakon T.
    Nakamoto Y.
    SAE International Journal of Transportation Cybersecurity and Privacy, 2021, 3 (02):
  • [27] Design of a Secure Chat Application based on AES Cryptographic Algorithm and Key Management
    Bardis, Nikolaos G.
    Ntaikos, Konstantinos
    MATHEMATICAL METHODS, COMPUTATIONAL TECHNIQUES, NON-LINEAR SYSTEMS, INTELLIGENT SYSTEMS, 2008, : 486 - +
  • [28] Multimedia security in group communications: recent progress in key management, authentication, and watermarking
    Eskicioglu, AM
    MULTIMEDIA SYSTEMS, 2003, 9 (03) : 239 - 248
  • [29] Multimedia security in group communications: recent progress in key management, authentication, and watermarking
    Ahmet M. Eskicioglu
    Multimedia Systems, 2003, 9 : 239 - 248
  • [30] Applying Symmetric and Asymmetric Key Algorithms for the Security in Wireless Networks: Proof of Correctness
    Boukerche, Azzedine
    Ren, Yonglin
    Mokdad, Lynda
    Q2SWINET 2010: PROCEEDINGS OF THE SIXTH ACM SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2010, : 33 - 40