A generic security API for symmetric key management on cryptographic devices

被引:4
|
作者
Cortier, Veronique [1 ]
Steel, Graham [2 ]
机构
[1] CNRS, Loria, UMR 7503, F-54500 Vandoeuvre Les Nancy, France
[2] INRIA Project ProSecCo, F-75013 Paris, France
基金
欧洲研究理事会;
关键词
Security APIs; Key management; PKCS#11; Cryptographic devices; AUTHENTICATION;
D O I
10.1016/j.ic.2014.07.010
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a new symmetric key management API for cryptographic devices intended to implement security protocols in distributed systems. Our API has a formal security policy and proofs of security in the symbolic model, under various threat scenarios. This sets it apart from previous APIs such as RSA PKCS#11, which are under-specified, lack a clear security policy and are often subject to attacks. Our design is based on the principle of explicitness: the security policy for a key must be given at creation time, and this policy is then included in any ciphertext containing the key. Our API also contains novel features such as the possibility of insisting on a freshness check before accepting an encrypted key for import. To show the applicability of our design, we give an algorithm for automatically instantiating the API commands for a given key management protocol and apply it on the Clark-Jacob protocols suite. (C) 2014 Elsevier Inc. All rights reserved.
引用
收藏
页码:208 / 232
页数:25
相关论文
共 50 条
  • [21] Reliability Analysis for Cryptographic Key Management
    Xiao, Sheng
    Gong, Weibo
    Towsley, Don
    Zhang, Qingquan
    Zhu, Ting
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 999 - 1004
  • [22] ON A CERTAIN MODEL OF CRYPTOGRAPHIC KEY MANAGEMENT
    Nyssanbayeva, S. E.
    Kapalova, N. A.
    Haumen, A.
    [J]. EURASIAN JOURNAL OF MATHEMATICAL AND COMPUTER APPLICATIONS, 2020, 8 (04): : 15 - 22
  • [23] A portable hardware security module and cryptographic key generator
    Murtaza, Malik Hamza
    Tahir, Hasan
    Tahir, Shahzaib
    Alizai, Zahoor Ahmed
    Riaz, Qaiser
    Hussain, Mehdi
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 70
  • [24] GGSS-API: A group enhanced generic security service
    Hutchison, CM
    [J]. INFORMATION SECURITY IN RESEARCH AND BUSINESS, 1997, : 101 - 110
  • [25] Cryptographic key protection against FROST for mobile devices
    Zhang, Xiaosong
    Tan, Yu-an
    Xue, Yuan
    Zhang, Quanxin
    Li, Yuanzhang
    Zhang, Can
    Zheng, Jun
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (03): : 2393 - 2402
  • [26] Cryptographic key protection against FROST for mobile devices
    Xiaosong Zhang
    Yu-an Tan
    Yuan Xue
    Quanxin Zhang
    Yuanzhang Li
    Can Zhang
    Jun Zheng
    [J]. Cluster Computing, 2017, 20 : 2393 - 2402
  • [27] A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case
    Shrimpton, Thomas
    Stam, Martijn
    Warinschi, Bogdan
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 : 277 - 307
  • [28] Symmetric and asymmetric cryptographic key exchange protocols in the octonion algebra
    Z. Lipiński
    [J]. Applicable Algebra in Engineering, Communication and Computing, 2021, 32 : 81 - 96
  • [29] RASS - A Concurrency Based Bitwise Symmetric Key Cryptographic Algorithm
    Roy, Abhriya
    Ray, Ronit
    De, Saptarshi
    Guha, Shalini
    Goswami, Sukalyan
    Basak, Ratan Kumar
    Mukhopadhyay, Bipasha
    Chatterjee, Souvik
    Zaman, Amrin
    Nag, Sucheta
    [J]. 2016 IEEE 7TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS MOBILE COMMUNICATION CONFERENCE (UEMCON), 2016,
  • [30] Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols
    Aly, Abdelrahaman
    Ashur, Tomer
    Ben-Sasson, Eli
    Dhooghe, Siemen
    Szepieniec, Alan
    [J]. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 (03) : 1 - 45