Remotely Keyed Encryption Using Non-Encrypting Smart Cards
نویسندگان
چکیده
Remotely keyed encryption supports fast encryption on a slow smart card. For the scheme described here, even a smart card without a builtin encryption function, would do the job, e.g., a signature card.
منابع مشابه
A Formal Treatment of Remotely
Remotely keyed encryption schemes (RKESs), introduced by Blaze 6], support high-bandwidth cryptographic applications (such as encrypted video conferences) in which long-lived secrets (such as users' private keys) never leave lower-bandwidth environments such as secure smart-cards. We provide a formal framework in which to study the security of RKESs and give an RKES that satisses our formal sec...
متن کاملAccelerated Remotely Keyed Encruption
Remotely keyed encryption schemes (RKESs) support fast encryption and decryption using low-bandwidth devices, such as secure smartcards. The long-lived secret keys never leave the smartcard, but most of the encryption is done on a fast untrusted device, such as the smartcard’s host. This paper describes an new scheme, the length-preserving “accelerated remotely keyed” (ARK) encryption scheme an...
متن کاملScramble All, Encrypt Small
In this paper, we propose a new design tool for “block encryption”, allowing the en/decryption of arbitrarily long messages, but performing en/decryption on only a single block (e.g., 128 bit block), where the rest of the message is only processed by a good scrambling function (e.g., one based on an ideal hash function). The design can be a component in constructing various schemes where the ab...
متن کاملOn the Security of Remotely Keyed Encryption
The purpose of remotely keyed encryption is to eeciently realize a secret-key block cipher by sharing the computational burden between a fast untrusted device and a slow device trusted with the key. This paper deals with how to deene the security of remotely keyed en-cryption schemes. Since the attacker can take over the slow device and actually take part in the encryption process, common deeni...
متن کاملBreaking the Shin-Shin-Rhee remotely keyed encryption schemes
Remotely keyed encryption (RKE) schemes provide fast symmetric encryption and decryption using a small-bandwidth security module and a powerful host. Such schemes keep the key inside the security module to prevent key compromise. Shin, Shin, and Rhee proposed a length-preserving as well as a length-increasing RKE scheme that both use only a single round of interaction between host and security ...
متن کامل