The design of a cryptographic security architecture

被引:0
|
作者
Gutmann, P [1 ]
机构
[1] Univ Auckland, Auckland 1, New Zealand
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Traditional security toolkits have concentrated mostly on defining a programming: interface (API) and left the internals up to individual implementers. This paper presents a design for a portable, flexible security architecture based on traditional computer security models involving a security kernel which controls access to security-relevant objects and attributes based on a configurable security policy. Layered on top of the kernel are various objects which abstract core functionality such as encryption and digital signature capabilities, certificate management, and secure sessions and data enveloping (email encryption) in a manner which allows them to be easily moved into cryptographic devices such as smart cards and crypto accelerators for extra performance or security. The versatility of the design has been proven through its use in implementations ranging from from 16-bit microcontrollers through to supercomputers, as well as a number of unusual areas such as security modules in ATM's.
引用
收藏
页码:153 / 168
页数:16
相关论文
共 50 条
  • [1] TRANSACTION SECURITY SYSTEM EXTENSIONS TO THE COMMON CRYPTOGRAPHIC ARCHITECTURE
    JOHNSON, DB
    DOLAN, GM
    [J]. IBM SYSTEMS JOURNAL, 1991, 30 (02) : 230 - 243
  • [2] A VLIW Architecture Stream Cryptographic Processor for Information Security
    Nan, Longmei
    Yang, Xuan
    Zeng, Xiaoyang
    Li, Wei
    Du, Yiran
    Dai, Zibin
    Chen, Lin
    [J]. CHINA COMMUNICATIONS, 2019, 16 (06) : 185 - 199
  • [3] A VLIW Architecture Stream Cryptographic Processor for Information Security
    Longmei Nan
    Xuan Yang
    Xiaoyang Zeng
    Wei Li
    Yiran Du
    Zibin Dai
    Lin Chen
    [J]. China Communications, 2019, 16 (06) : 185 - 199
  • [4] Design for Security Test on Cryptographic ICs for Design-Time Security Evaluation
    Shao, Cuiping
    Li, Huiyun
    Xu, Guoqing
    Hu, Xiaobo
    [J]. 2014 9TH INTERNATIONAL DESIGN & TEST SYMPOSIUM (IDT), 2014, : 118 - 123
  • [5] Design of Cryptographic Hardware Architecture for Mobile Computing
    Kim, Mooseop
    Kim, Youngsae
    Cho, Hyunsook
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2009, 5 (04): : 187 - 196
  • [6] Design of a Cryptographic Tamper Detection Scheme for Network Security
    Rao, B. Srinivasa
    Prasad, S. D. V.
    [J]. ADVANCES IN NETWORK SECURITY AND APPLICATIONS, 2011, 196 : 214 - 224
  • [7] A robust architecture of ring oscillator PUF: Enhancing cryptographic security with configurability
    Kareem, Husam
    Dunaev, Dmitriy
    [J]. MICROELECTRONICS JOURNAL, 2024, 143
  • [8] Design of a novel asynchronous reconfigurable architecture for cryptographic applications
    Sun, Kang
    Pan, Xuezeng
    Wang, Jiebing
    Wang, Jimin
    [J]. FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 751 - +
  • [9] Java']Java security architecture and extensions - Application independence of cryptographic primitives
    Roth, V
    [J]. DR DOBBS JOURNAL, 2002, 27 (04): : 34 - +
  • [10] A Philosophy of Security Architecture Design
    Koien, Geir M.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 113 (03) : 1615 - 1639