Advertisement

Secure Software Smartcard Resilient to Capture

  • Seung Wook Jung
  • Christoph Ruland
Conference paper
  • 716 Downloads
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3802)

Abstract

We present a simple secure software smartcard that can be immunized against offline dictionary attack when the adversary captures the device. The proposed scheme also provides proactive security for the device’s private key, i.e., proactively updates to the remote server and device to eliminate any threat of offline dictionary attacks due to previously compromised devices.

Keywords

Secure Software Dictionary Attack Consecutive Error Schnorr Signature Offline Dictionary Attack 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Hoover, D., Kausik, B.: Software smart cards via cryptographic camouflage. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy (SSP 1999), Washington, Brussels, Tokyo, pp. 208–215. IEEE, Los Alamitos (1999)Google Scholar
  2. 2.
    MacKenzie, P., Reiter, M.: Networked cryptographic devices resilient to capture. International Journal of Information Security 2, 1–20 (2003)CrossRefGoogle Scholar
  3. 3.
    Kwon, T.: Robust software tokens: Towards securing a digital identity (2001)Google Scholar
  4. 4.
    MacKenzie, P., Reiter, M.K.: Two-party generation of DSA signatures. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 137–154. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  5. 5.
    Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive secret sharing or: How to cope with perpetual leakage. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 339–352. Springer, Heidelberg (1995)Google Scholar
  6. 6.
    Ostrovsky, R., Yung, M.: How to withstand mobile virus attacks. In: Proc. 10th ACM Symp. on Principles of Distributed Computation, pp. 51–59 (1991)Google Scholar
  7. 7.
    Herzberg, A., Jakobsson, M., Jarecki, S., Krawczyk, H., Yung, M.: Proactive public key and signature systems. In: ACM Conference on Computer and Communications Security, pp. 100–110 (1997)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Seung Wook Jung
    • 1
  • Christoph Ruland
    • 1
  1. 1.Institute for Data Communications SystemsUniversity of SiegenSiegenGermany

Personalised recommendations