A Trusted Authentication Protocol based on SDIO Smart Card for DRM
نویسندگان
چکیده
Terminals security vulnerabilities makes DRM researches to focus on trusted computing technology in recent years, however, no efficient and practical trusted authentication protocol is presented, especially with formal proof. To attest the integrity when access to the DRM server, the DRM client need perform mutual authentication and key agreement with the server first, and then use the sharing key to encrypt the integrity values. A novel trusted authentication protocol based on SDIO smart card is presented together with its formal security proof. The proposed protocol is composed of registration phase, login phase, identity authentication and key agreement phase, and integrity attestation phase. In contrast to other corrective schemes through attack resisting analysis and computational cost analysis, the proposed scheme is able to provide greater security and practicality to guarantee the trust attestation for DRM.
منابع مشابه
Authenticating Secure Tokens Using Slow Memory Access
We present an authentication protocol that allows a token, such as a smart card, to authenticate itself to a back-end trusted computer system through an untrusted reader. This protocol relies on the fact that the token will only respond to queries slowly, and that the token owner will not sit patiently while the reader seems not to be working. This protocol can be used alone, with \dumb" memory...
متن کاملUser Authentication with Smart Cards in Trusted Computing Architecture
The introduction of smart cards into trusted architectures establishes a clear-cut separation between the roles and responsibilities of both platform and user. On one hand, the Trusted Platform Module (TPM) ensures the platform trustworthiness and secures platform credentials and secrets, while smart cards guarantee user identity and protect user credentials and access authorization. Starting f...
متن کاملApplicability of Smart Cards to Network User Authentication
This paper addresses security issues associated with authenticating users to system services in distributed information systems. Its focus is the presentation of an approach for augmenting the Kerberos network user identification and authentication protocol through the integration of emerging smart card technology. Our conclusions indicate that the security of Kerberos-based network authenticat...
متن کاملMutual Authentication Scheme with Smart Cards and Password under Trusted Computing
Only identities of the server and the user are authenticated in traditional smart cards based password authentication schemes, but the platform does not be verified, and which cannot provide enough protection on personal information of the user. A mutual authentication scheme based on smart cards and password is proposed under trusted computing, in which hash functions are used to authenticate ...
متن کاملA Smart Card Based Solution for User-Centric Identity Management
This paper presents a prototype of a previously proposed user-centric identity management system using trusted modules. The trusted module, implemented using a smart card, can retrieve user attributes from identity providers and offer them to service providers, after authentication. This paper allows an evaluation of the practical feasibility of the identity management architecture and provides...
متن کامل