The Security Advantages of Hardware Tokens over Software Tokens for PKI Applications

نویسنده

  • Yehuda Lindell
چکیده

.......................................................................................................3 Background ..................................................................................................4 Soft Tokens and Their Vulnerabilities ..........................................................5 Hardware Tokens and Smart Cards ..............................................................8 References ..................................................................................................11 About Aladdin ............................................................................................12 About eToken .............................................................................................12 White Paper SW vs HW r03 draft 31 1 22/05/2006 10:14:34 2 The Security Advantages of Hardware Tokens over Software Tokens for PKI Applications White Paper SW vs HW r03 draft 32 2 22/05/2006 10:14:36 3 The Security Advantages of Hardware Tokens over Software Tokens for PKI Applications

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Founding Cryptography on Tamper-Proof Hardware Tokens

A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the problem of software protection via oblivious RAM. Goldwasser, Kalai, and Rothblum introduced the concept of one-time programs: in a one-time program, an honest sender sends a set of simple hardware tokens to a (potenti...

متن کامل

Secure Set Intersection with Untrusted Hardware Tokens

Secure set intersection protocols are the core building block for a manifold of privacy-preserving applications. In a recent work, Hazay and Lindell (ACM CCS 2008) introduced the idea of using trusted hardware tokens for the set intersection problem, devising protocols which improve over previous (in the standard model of two-party computation) protocols in terms of efficiency and secure compos...

متن کامل

Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Tokens

Resettable hardware tokens, usually in the form of smart cards, are used for a variety of security-critical tasks in open environments. Many of these tasks require trusted hardware tokens. With the complexity of hardware, however, it is not feasible to check if the hardware contains an internal state or gives away information over side channels. This inspires the question of the cryptographic s...

متن کامل

On Efficient Non-Interactive Oblivious Transfer with Tamper-Proof Hardware

Oblivious transfer (OT, for short) [Rab81] is a fundamental primitive in the foundations of Cryptography. While in the standard model OT constructions rely on public-key cryptography, only very recently Kolesnikov in [Kol10] showed a truly efficient string OT protocol by using tamper-proof hardware tokens. His construction only needs few evaluations of a block cipher and requires stateless (the...

متن کامل

1st Annual PKI Research Workshop---Proceedings

This paper focuses upon the security characteristics of cryptographic mobility (CM) solutions. CM solutions allow the roaming user to make use of their cryptographic credentials from any workstation or system that has network connectivity to the appropriate credential server(s), without the need to carry portable software or hardware tokens. While CM implementations have a greater potential for...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006