Modelling Security Protocols based on Smart Cards

نویسنده

  • Giampaolo Bella
چکیده

Security protocols based on smart cards lack formal analysis. The theoretic analysis by Bellare & Rogaway is the best example in this small eld. We propose an alternative approach obtained as an extension to Paulson's Inductive Approach, which is based on theorem proving. Our model certainly relies on a consistently smaller formal overhead, but carries adequate expressiveness allowing smart cards to be lost or cracked by an eavesdropper. The model is tested on the Shoup-Rubin protocol, and several guarantees proved to show that the model behaves as it is meant to. We believe that our work might make the formal analyses of protocols based on smart cards a more common practice. Our treatment should be understandable also outside the theorem proving community.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CryptoNET: Security Management Protocols

In this paper we describe several network security protocols used by various components of CryptoNET architecture. The protocols are based on the concept of generic security objects and on wellestablished security standards and technologies. Distinctive features of our security protocols are: (1) they are complete in terms of their functionality, (2) they are easy to integrate with applications...

متن کامل

Software License Management with Smart Cards

This paper describes public-key protocols for binding software licenses to tamper-resistant smart cards, for transferring licenses between cards, and for purchasing them on-line. The protocols support software distribution both through retail stores and over the Internet. The user can transfer licenses from several cards onto a single card to avoid juggling between several cards in the reader. ...

متن کامل

Chaotic Maps-Based Mutual Authentication and Key Agreement using Smart Cards for Wireless Communications

Mobile users can roam into foreign networks and transmit messages to foreign agents, and they can access the services provided by a foreign agent by using their mobile devices. Thus, mobile user authentication and key agreement for wireless communications are becoming more and more important. In recent years, most of the existing user authentication and key-agreement protocols with smart cards ...

متن کامل

Implementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers

Most lattice-based cryptographic schemes which enjoy a security proof suffer from huge key sizes and heavy computations. This is also true for the simpler case of identification protocols. Recent progress on ideal lattices has significantly improved the efficiency, and made it possible to implement practical lattice-based cryptography on constrained devices like FPGAs and smart phones. However,...

متن کامل

Hardware and Software Symbiosis Helps Smart Card Evolution

The need to manage and secure a rapidly growing information network has focused increasing attention on smart card technology. Over the past decade, smart cards evolved from offering basic memory to complex systems with chips that incorporate powerful processing units with dedicated peripherals. This evolution enabled a wide range of applications. Smart card applications include financial trans...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999