A generic security API for symmetric key management on cryptographic devices

被引:4
|
作者
Cortier, Veronique [1 ]
Steel, Graham [2 ]
机构
[1] CNRS, Loria, UMR 7503, F-54500 Vandoeuvre Les Nancy, France
[2] INRIA Project ProSecCo, F-75013 Paris, France
基金
欧洲研究理事会;
关键词
Security APIs; Key management; PKCS#11; Cryptographic devices; AUTHENTICATION;
D O I
10.1016/j.ic.2014.07.010
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a new symmetric key management API for cryptographic devices intended to implement security protocols in distributed systems. Our API has a formal security policy and proofs of security in the symbolic model, under various threat scenarios. This sets it apart from previous APIs such as RSA PKCS#11, which are under-specified, lack a clear security policy and are often subject to attacks. Our design is based on the principle of explicitness: the security policy for a key must be given at creation time, and this policy is then included in any ciphertext containing the key. Our API also contains novel features such as the possibility of insisting on a freshness check before accepting an encrypted key for import. To show the applicability of our design, we give an algorithm for automatically instantiating the API commands for a given key management protocol and apply it on the Clark-Jacob protocols suite. (C) 2014 Elsevier Inc. All rights reserved.
引用
收藏
页码:208 / 232
页数:25
相关论文
共 50 条
  • [31] A Symmetric Key Cryptographic Encryption Technique of MPEG Digital Video Images Based on RGB Pixel Transposition and Shuffling
    Kester, Quist-Aphetsi
    Nana, Laurent
    Pascu, Anca Christine
    Gire, Sophie
    Eghan, Jojo M.
    Quaynor, Nii Narku
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2015, 10 (04): : 192 - 199
  • [32] Security Vulnerability and Robust Security Requirements using Key Management in Sensor Network
    Patel, Jaykumar Shantilal
    Chavda, Vijaykumar M.
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (03): : 23 - 28
  • [33] Classification and Key Management Approaches for Space Networks Security
    Hu, Shengbo
    Meng, Xin
    2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 124 - +
  • [34] Classification of Symmetric Key Management Schemes for Wireless Sensor Networks
    Bala, Suman
    Sharma, Gaurav
    Verma, Anil K.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (02): : 117 - 137
  • [35] An efficient hierarchical key management scheme using symmetric encryptions
    Lin, CH
    Lee, W
    Ho, YK
    AINA 2005: 19th International Conference on Advanced Information Networking and Applications, Vol 2, 2005, : 399 - 402
  • [36] On the Specification of Symmetric Key Management Parameters for Secure Space Missions
    Juliato, Marcio
    Gebotys, Catherine
    Sanchez, Ignacio Aguilar
    2012 IEEE FIRST AESS EUROPEAN CONFERENCE ON SATELLITE TELECOMMUNICATIONS (ESTEL), 2012,
  • [37] A KEY MANAGEMENT FOR NON-UNIFORM SECURITY ENVIRONMENT
    Huang Jin-Wang
    Li Guang-Ming
    Sheng Yan
    Wu Zhong-Liang
    Feng Jiu-Chao
    2013 10TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2013, : 290 - +
  • [38] An Effective Data Security Mechanism for Secured Data Communications Using Hybrid Cryptographic Technique and Quantum Key Distribution
    Sivakumar, Jananya
    Ganapathy, Sannasi
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 133 (03) : 1829 - 1856
  • [39] Key management protocol with end-to-end data security and key revocation for a multi-BS wireless sensor network
    Ferng, Huei-Wen
    Nurhakim, Jeffrey
    Horng, Shi-Jinn
    WIRELESS NETWORKS, 2014, 20 (04) : 625 - 637
  • [40] On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices
    Sun, Da-Zhi
    Gao, Yi-Na
    Tian, Yangguang
    SENSORS, 2023, 23 (14)