A generic security API for symmetric key management on cryptographic devices

被引:4
|
作者
Cortier, Veronique [1 ]
Steel, Graham [2 ]
机构
[1] CNRS, Loria, UMR 7503, F-54500 Vandoeuvre Les Nancy, France
[2] INRIA Project ProSecCo, F-75013 Paris, France
基金
欧洲研究理事会;
关键词
Security APIs; Key management; PKCS#11; Cryptographic devices; AUTHENTICATION;
D O I
10.1016/j.ic.2014.07.010
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a new symmetric key management API for cryptographic devices intended to implement security protocols in distributed systems. Our API has a formal security policy and proofs of security in the symbolic model, under various threat scenarios. This sets it apart from previous APIs such as RSA PKCS#11, which are under-specified, lack a clear security policy and are often subject to attacks. Our design is based on the principle of explicitness: the security policy for a key must be given at creation time, and this policy is then included in any ciphertext containing the key. Our API also contains novel features such as the possibility of insisting on a freshness check before accepting an encrypted key for import. To show the applicability of our design, we give an algorithm for automatically instantiating the API commands for a given key management protocol and apply it on the Clark-Jacob protocols suite. (C) 2014 Elsevier Inc. All rights reserved.
引用
收藏
页码:208 / 232
页数:25
相关论文
共 50 条
  • [1] A Generic Security API for Symmetric Key Management on Cryptographic Devices
    Cortier, Veronique
    Steel, Graham
    [J]. COMPUTER SECURITY - ESORICS 2009, PROCEEDINGS, 2009, 5789 : 605 - +
  • [2] On the round security of symmetric-key cryptographic primitives
    Ramzan, Z
    Reyzin, L
    [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 376 - 393
  • [3] Classical and Physical Security of Symmetric Key Cryptographic Algorithms
    Baksi, Anubhab
    [J]. PROCEEDINGS OF THE 2021 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2021, : 186 - 187
  • [4] A symmetric neural cryptographic key generation scheme for Iot security
    Sarkar, Arindam
    [J]. APPLIED INTELLIGENCE, 2023, 53 (08) : 9344 - 9367
  • [5] A symmetric neural cryptographic key generation scheme for Iot security
    Arindam Sarkar
    [J]. Applied Intelligence, 2023, 53 : 9344 - 9367
  • [6] Efficient key management methods for symmetric cryptographic algorithm
    Sreehari, K. N.
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC 2018), 2018, : 377 - 380
  • [7] Towards A Scalable Symmetric Key Cryptographic Scheme: Performance Evaluation and Security Analysis
    Kholidy, Hisham A.
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [8] Cloud Security Architecture Based on User Authentication and Symmetric Key Cryptographic Techniques
    Wani, Abdul Raoof
    Rana, Q. P.
    Pandey, Nitin
    [J]. 2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2017, : 529 - 534
  • [9] A cryptographic key management solution for HIPAA privacy/security regulations
    Lee, Wei-Bin
    Lee, Chien-Ding
    [J]. IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2008, 12 (01): : 34 - 41
  • [10] SECURITY FEATURES COMPARISON OF MASTER KEY AND IKM CRYPTOGRAPHIC KEY MANAGEMENT FOR RESEARCHERS AND DEVELOPERS
    Yazdanpanah, Saeed
    Chaeikar, Saman Shojae
    Zamani, Mazdak
    Kourdi, Reza
    [J]. PROCEEDINGS OF THE 2011 3RD INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGY AND ENGINEERING (ICSTE 2011), 2011, : 365 - 369