A Secure Channel Protocol for Multi-Application Smart Cards Based on Public Key Cryptography

نویسندگان

  • Konstantinos Markantonakis
  • Keith Mayes
چکیده

Smart card secure channel protocols based on public key cryptography are not widely utilised mainly due to processing overheads introduced in the underlying smart card microprocessors and the complexities introduced by the operation of a PKI infrastructure. In this paper we analyse the significance of public key secure channel protocols in multi-application smart cards. We believe that multi-application smart card technology (e.g. the GlobalPlatform smart card specification) should benefit more from the advantages of public key cryptography specifically for the initiation and maintenance of a secure channel. This paper introduces a public key based cryptographic protocol for secure entity authentication, data integrity and data confidentiality. The proposed secure channel protocol uses a combination of public key, secret key and the main idea behind the Diffie-Hellman key establishment protocols in order to achieve the desired goals.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Asymmetric Cryptography Secure Channel Protocol for Smart Cards

Smart eard seeure ehannel protocols based on publie key eryptography are not widely utilised mainly due to proeessing overheads introdueed in the underlying smart eard microproeessors and the complexities introdueed by the operation of a PKI infrastructure, In this paper we analyse the signifieanee of publie key seeure ehannel protoeols in multi applieation smart eards. We believe that multi ap...

متن کامل

Secure Personalization Using Proxy Cryptography

In this paper we describe new secure personalization schemes using proxy cryptography. We first introduce the context of a large scale smart card application such as an electronic purse, the currents personalization schemes and the security requirements. We recall the notion of proxy cryptography and we consider an actual proxy cryptosystem based on ElGamal public key encryption. With this prox...

متن کامل

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

A Password-Authenticated Key Agreement Scheme Based on ECC Using Smart Cards

Public Key Cryptography (PKC) is recently playing an essential role in electronic banking and financial transactions. Elliptic Curve Cryptography (ECC) is one of the best public key techniques for its small key size and high security and is suitable for secure access of smart cards because implementation on smart cards is challenging due to memory, bandwidth, and computation constraints. In thi...

متن کامل

A Multi-server Authenticated Key Agreement Protocol with Privacy preserving Based on Chaotic Maps in Random Oracle Model

In the research literature, a typical authenticated key agreement protocol is designed to realize mutual authentication and key secrecy. In a network, as a crucial cryptographic primitive, key agreement can establish secure communication channels for communication entities. Meanwhile, the users privacy is particularity important, especially for multi-server authentication environment. Network p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004