A Secure Cryptographic Token Interface

被引:12
作者
Cachin, Christian [1 ]
Chandran, Nishanth [2 ]
机构
[1] IBM Res, Zurich Res Lab, CH-8803 Ruschlikon, Switzerland
[2] Univ Calif Los Angeles, Dept Comp Sci, Los Angeles, CA 90095 USA
来源
PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM | 2009年
关键词
D O I
10.1109/CSF.2009.7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cryptographic keys must be protected from exposure. In real-world applications, they are often guarded by cryptographic tokens that employ sophisticated hardware-security measures. Several logical attacks on the key management operations of cryptographic tokens have been reported in the past, which allowed to expose keys merely by exploiting the token API in unexpected ways. This paper proposes a novel, provably secure, cryptographic token interface that supports multiple users, implements symmetric cryptosystems and public-key schemes, and provides operations for key generation, encryption, authentication, and key wrapping. The token interface allows only the most important operations found in real-world token APIs; while flexible to be of practical use, it is restricted enough so that it does not expose any key to a user without sufficient privileges. The security policy can be applied to the industry-standard PKCS #11 interface.
引用
收藏
页码:141 / +
页数:3
相关论文
共 28 条
[1]  
ADIDA B, 2007, SECURITY EMV S UNPUB
[2]  
An JH, 2002, LECT NOTES COMPUT SC, V2332, P83
[3]   Cryptographic processors - A surrey [J].
Anderson, R ;
Bond, M ;
Clulow, J ;
Skorobogatov, S .
PROCEEDINGS OF THE IEEE, 2006, 94 (02) :357-369
[4]  
[Anonymous], CRYPTO
[5]  
[Anonymous], 2007, NIST SPECIAL PUBLICA
[6]  
[Anonymous], 1993, P 1 ACM C COMPUTER C, DOI [10.1145/168588.168615, DOI 10.1145/168588.168615]
[7]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1976, P531
[8]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P259
[9]  
*BITS SEC WORK GRO, 2008, ENT KEY MAN
[10]  
Black J, 2003, LECT NOTES COMPUT SC, V2595, P62