The Security Advantages of Hardware Tokens over Software Tokens for PKI Applications
نویسنده
چکیده
.......................................................................................................3 Background ..................................................................................................4 Soft Tokens and Their Vulnerabilities ..........................................................5 Hardware Tokens and Smart Cards ..............................................................8 References ..................................................................................................11 About Aladdin ............................................................................................12 About eToken .............................................................................................12 White Paper SW vs HW r03 draft 31 1 22/05/2006 10:14:34 2 The Security Advantages of Hardware Tokens over Software Tokens for PKI Applications White Paper SW vs HW r03 draft 32 2 22/05/2006 10:14:36 3 The Security Advantages of Hardware Tokens over Software Tokens for PKI Applications
منابع مشابه
Founding Cryptography on Tamper-Proof Hardware Tokens
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the problem of software protection via oblivious RAM. Goldwasser, Kalai, and Rothblum introduced the concept of one-time programs: in a one-time program, an honest sender sends a set of simple hardware tokens to a (potenti...
متن کاملSecure Set Intersection with Untrusted Hardware Tokens
Secure set intersection protocols are the core building block for a manifold of privacy-preserving applications. In a recent work, Hazay and Lindell (ACM CCS 2008) introduced the idea of using trusted hardware tokens for the set intersection problem, devising protocols which improve over previous (in the standard model of two-party computation) protocols in terms of efficiency and secure compos...
متن کاملImplementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Tokens
Resettable hardware tokens, usually in the form of smart cards, are used for a variety of security-critical tasks in open environments. Many of these tasks require trusted hardware tokens. With the complexity of hardware, however, it is not feasible to check if the hardware contains an internal state or gives away information over side channels. This inspires the question of the cryptographic s...
متن کاملOn Efficient Non-Interactive Oblivious Transfer with Tamper-Proof Hardware
Oblivious transfer (OT, for short) [Rab81] is a fundamental primitive in the foundations of Cryptography. While in the standard model OT constructions rely on public-key cryptography, only very recently Kolesnikov in [Kol10] showed a truly efficient string OT protocol by using tamper-proof hardware tokens. His construction only needs few evaluations of a block cipher and requires stateless (the...
متن کامل1st Annual PKI Research Workshop---Proceedings
This paper focuses upon the security characteristics of cryptographic mobility (CM) solutions. CM solutions allow the roaming user to make use of their cryptographic credentials from any workstation or system that has network connectivity to the appropriate credential server(s), without the need to carry portable software or hardware tokens. While CM implementations have a greater potential for...
متن کامل