Modelling Security Protocols based on Smart Cards
نویسنده
چکیده
Security protocols based on smart cards lack formal analysis. The theoretic analysis by Bellare & Rogaway is the best example in this small eld. We propose an alternative approach obtained as an extension to Paulson's Inductive Approach, which is based on theorem proving. Our model certainly relies on a consistently smaller formal overhead, but carries adequate expressiveness allowing smart cards to be lost or cracked by an eavesdropper. The model is tested on the Shoup-Rubin protocol, and several guarantees proved to show that the model behaves as it is meant to. We believe that our work might make the formal analyses of protocols based on smart cards a more common practice. Our treatment should be understandable also outside the theorem proving community.
منابع مشابه
CryptoNET: Security Management Protocols
In this paper we describe several network security protocols used by various components of CryptoNET architecture. The protocols are based on the concept of generic security objects and on wellestablished security standards and technologies. Distinctive features of our security protocols are: (1) they are complete in terms of their functionality, (2) they are easy to integrate with applications...
متن کاملSoftware License Management with Smart Cards
This paper describes public-key protocols for binding software licenses to tamper-resistant smart cards, for transferring licenses between cards, and for purchasing them on-line. The protocols support software distribution both through retail stores and over the Internet. The user can transfer licenses from several cards onto a single card to avoid juggling between several cards in the reader. ...
متن کاملChaotic Maps-Based Mutual Authentication and Key Agreement using Smart Cards for Wireless Communications
Mobile users can roam into foreign networks and transmit messages to foreign agents, and they can access the services provided by a foreign agent by using their mobile devices. Thus, mobile user authentication and key agreement for wireless communications are becoming more and more important. In recent years, most of the existing user authentication and key-agreement protocols with smart cards ...
متن کاملImplementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers
Most lattice-based cryptographic schemes which enjoy a security proof suffer from huge key sizes and heavy computations. This is also true for the simpler case of identification protocols. Recent progress on ideal lattices has significantly improved the efficiency, and made it possible to implement practical lattice-based cryptography on constrained devices like FPGAs and smart phones. However,...
متن کاملHardware and Software Symbiosis Helps Smart Card Evolution
The need to manage and secure a rapidly growing information network has focused increasing attention on smart card technology. Over the past decade, smart cards evolved from offering basic memory to complex systems with chips that incorporate powerful processing units with dedicated peripherals. This evolution enabled a wide range of applications. Smart card applications include financial trans...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999