A Secure Cryptographic Token Interface

被引:12
|
作者
Cachin, Christian [1 ]
Chandran, Nishanth [2 ]
机构
[1] IBM Res, Zurich Res Lab, CH-8803 Ruschlikon, Switzerland
[2] Univ Calif Los Angeles, Dept Comp Sci, Los Angeles, CA 90095 USA
关键词
D O I
10.1109/CSF.2009.7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cryptographic keys must be protected from exposure. In real-world applications, they are often guarded by cryptographic tokens that employ sophisticated hardware-security measures. Several logical attacks on the key management operations of cryptographic tokens have been reported in the past, which allowed to expose keys merely by exploiting the token API in unexpected ways. This paper proposes a novel, provably secure, cryptographic token interface that supports multiple users, implements symmetric cryptosystems and public-key schemes, and provides operations for key generation, encryption, authentication, and key wrapping. The token interface allows only the most important operations found in real-world token APIs; while flexible to be of practical use, it is restricted enough so that it does not expose any key to a user without sufficient privileges. The security policy can be applied to the industry-standard PKCS #11 interface.
引用
收藏
页码:141 / +
页数:3
相关论文
共 50 条
  • [31] Secure Cryptographic E-Auction System
    Heng, Swee-Huay
    Tan, Soo -Chin
    INTERNATIONAL JOURNAL OF TECHNOLOGY, 2022, 13 (06) : 1222 - 1230
  • [32] The sponge construction as a source of secure cryptographic primitives
    Borowski, Mariusz
    2013 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MCC), 2013,
  • [33] Safe and Secure? On the Timing Analysability of Cryptographic Implementations
    Stegmeier, Alexander
    Knauer, Peter
    Schubaur, Philipp
    Piatka, Christian
    Merli, Dominik
    Altmeyer, Sebastian
    2024 IEEE 30TH REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM, RTAS 2024, 2023, : 68 - 80
  • [34] Secure Storage System Using Cryptographic Techniques
    AlShalaan, Manal
    AlSubaie, Reem
    Ara, Anees
    2022 FIFTH INTERNATIONAL CONFERENCE OF WOMEN IN DATA SCIENCE AT PRINCE SULTAN UNIVERSITY (WIDS-PSU 2022), 2022, : 138 - 142
  • [35] Design Optimization and Automation for Secure Cryptographic Circuits
    Lin, Kuan Jen
    Chiu, Yi Tang
    Fang, Shan Chien
    22ND INTERNATIONAL CONFERENCE ON VLSI DESIGN HELD JOINTLY WITH 8TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS, PROCEEDINGS, 2009, : 321 - +
  • [36] A Quantum Cryptographic Protocol for Secure Vehicular Communication
    Sutradhar, Kartick
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (05) : 3513 - 3522
  • [37] Cryptographic component identification: Enabler for secure vehicles
    Weimerskirch, A
    Paar, C
    Wolf, M
    VTC2005-FALL: 2005 IEEE 62ND VEHICULAR TECHNOLOGY CONFERENCE, 1-4, PROCEEDINGS, 2005, : 1227 - 1231
  • [38] Secure Management of Biomedical Data With Cryptographic Hardware
    Canim, Mustafa
    Kantarcioglu, Murat
    Malin, Bradley
    IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2012, 16 (01): : 166 - 175
  • [39] Lightweight and Secure Cryptographic Implementations for the Internet of Things
    Preneel, Bart
    INFORMATION SECURITY THEORY AND PRACTICE: SECURING THE INTERNET OF THINGS, 2014, 8501 : XIII - XIV
  • [40] Cryptographic techniques secure your wireless designs
    Conner, D
    EDN, 1996, 41 (02) : 57 - &