A Secure Cryptographic Token Interface

被引:12
|
作者
Cachin, Christian [1 ]
Chandran, Nishanth [2 ]
机构
[1] IBM Res, Zurich Res Lab, CH-8803 Ruschlikon, Switzerland
[2] Univ Calif Los Angeles, Dept Comp Sci, Los Angeles, CA 90095 USA
关键词
D O I
10.1109/CSF.2009.7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cryptographic keys must be protected from exposure. In real-world applications, they are often guarded by cryptographic tokens that employ sophisticated hardware-security measures. Several logical attacks on the key management operations of cryptographic tokens have been reported in the past, which allowed to expose keys merely by exploiting the token API in unexpected ways. This paper proposes a novel, provably secure, cryptographic token interface that supports multiple users, implements symmetric cryptosystems and public-key schemes, and provides operations for key generation, encryption, authentication, and key wrapping. The token interface allows only the most important operations found in real-world token APIs; while flexible to be of practical use, it is restricted enough so that it does not expose any key to a user without sufficient privileges. The security policy can be applied to the industry-standard PKCS #11 interface.
引用
收藏
页码:141 / +
页数:3
相关论文
共 50 条
  • [1] Cryptographic token interface
    2000, Shanghai Comp Soc, China (26):
  • [2] virtio-ct: A Secure Cryptographic Token Service in Hypervisors
    Guan, Le
    Li, Fengjun
    Jing, Jiwu
    Wang, Jing
    Ma, Ziqiang
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT II, 2015, 153 : 285 - 300
  • [3] Design and Implementation of Multiple Cryptographic Algorithm Interface Circuit Based on Secure SoC
    Zhang, Luguo
    Li, Zheng
    Wang, Ruijiao
    Wen, Shengjun
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 510 - 514
  • [4] Provably Secure Cryptographic ABAC System to Enhance Reliability and Privacy using Real-time Token and Dynamic Policy
    Zhu, Yan
    Yu, Ruyun
    Qin, Yao
    Ma, Di
    Chu, William Cheng-Chung
    2018 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2018), 2018, : 277 - 288
  • [5] CephArmor: A Lightweight Cryptographic Interface for Secure High-Performance Ceph Storage Systems
    Khoda Parast, Fatemeh
    Kelly, Brett
    Hakak, Saqib
    Wang, Yang
    Kent, Kenneth B.
    IEEE ACCESS, 2022, 10 : 127911 - 127927
  • [6] Secure Composition of Cryptographic Protocols
    Goyal, Vipul
    PROVABLE SECURITY, 2011, 6980 : 2 - 2
  • [7] A scalable and secure cryptographic service
    Xu, Shouhuai
    Sandhu, Ravi
    DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 144 - +
  • [8] Secure Composition of Cryptographic Protocols
    Goyal, Vipul
    INFORMATION SYSTEMS SECURITY, 2011, 7093 : 71 - 71
  • [9] Designing Secure Cryptographic Circuits
    Homma, N.
    2019 IEEE INTERNATIONAL ELECTRON DEVICES MEETING (IEDM), 2019,
  • [10] Feebly secure cryptographic primitives
    Hirsch E.A.
    Melanich O.
    Nikolenko S.I.
    Journal of Mathematical Sciences, 2013, 188 (1) : 17 - 34