A generic security API for symmetric key management on cryptographic devices

被引:4
|
作者
Cortier, Veronique [1 ]
Steel, Graham [2 ]
机构
[1] CNRS, Loria, UMR 7503, F-54500 Vandoeuvre Les Nancy, France
[2] INRIA Project ProSecCo, F-75013 Paris, France
基金
欧洲研究理事会;
关键词
Security APIs; Key management; PKCS#11; Cryptographic devices; AUTHENTICATION;
D O I
10.1016/j.ic.2014.07.010
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a new symmetric key management API for cryptographic devices intended to implement security protocols in distributed systems. Our API has a formal security policy and proofs of security in the symbolic model, under various threat scenarios. This sets it apart from previous APIs such as RSA PKCS#11, which are under-specified, lack a clear security policy and are often subject to attacks. Our design is based on the principle of explicitness: the security policy for a key must be given at creation time, and this policy is then included in any ciphertext containing the key. Our API also contains novel features such as the possibility of insisting on a freshness check before accepting an encrypted key for import. To show the applicability of our design, we give an algorithm for automatically instantiating the API commands for a given key management protocol and apply it on the Clark-Jacob protocols suite. (C) 2014 Elsevier Inc. All rights reserved.
引用
收藏
页码:208 / 232
页数:25
相关论文
共 50 条
  • [41] Security Improvement of Portable Key Management Using a Mobile Phone
    Kim, Jiye
    Lee, Donghoon
    Choi, Younsung
    Lee, Youngsook
    Won, Dongho
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2015, PT IV, 2015, 9158 : 148 - 159
  • [42] A Key Management Scheme for Security and Energy Efficiency in Sensor Networks
    Kim, Hye-Young
    Lee, Changhoon
    JOURNAL OF INTERNET TECHNOLOGY, 2012, 13 (02): : 223 - 231
  • [43] Key management requirments for Positive Train Control communications security
    Hartong, Mark
    Goel, Rajni
    Wijesekera, Duminda
    Proceedings of the 2006 Joint Rail Conference on Restoring and Upgrading Rail Infrastructure, Rolling Stock and Systems, 2006, 31 : 253 - 262
  • [44] Advance hybrid key management architecture for SCADA network security
    Rezai, Abdalhossein
    Keshavarzi, Parviz
    Moravej, Zahra
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4358 - 4368
  • [45] SECURITY AND PRIVACY FOR SMART GRID USING SCALABLE KEY MANAGEMENT
    Beevi, L. Sherin
    Merlin, G.
    MoganaPriya, G.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 4716 - 4721
  • [46] Security Assessment for Key Management in Mobile Ad Hoc Networks
    Abouhogail, Reham Abdellatif
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 169 - 182
  • [47] IoT Devices with Non-interactive Key Management Protocol
    Gagneja, Kanwalinderjit
    Kiefer, Riley
    2020 SIXTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV)), 2020,
  • [48] Key management scheme of distributed IoT devices based on blockchains
    Liu, Qingyuan
    Luo, Lei
    Wang, Jian
    Li, Wenshun
    Liu, Ruijia
    Yu, Ming
    IET COMMUNICATIONS, 2023, 17 (12) : 1409 - 1417
  • [49] Research on Large-scale Authentication Architecture and Key Management Protocol Based on Combined Symmetric Key
    Liu Tong
    Jiang Jiya
    2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 367 - 370
  • [50] A Machine-Checked Proof of Security for AWS Key Management Service
    Almeida, Jose Bacelar
    Barbosa, Manuel
    Barthe, Gilles
    Campagna, Matthew
    Cohen, Ernie
    Gregoire, Benjamin
    Pereira, Vitor
    Portela, Bernardo
    Strub, Pierre-Yves
    Tasiran, Serdar
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 63 - 78