06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4.7 Attestation Protocol<br />

party that certies the security and reliability features of the device.<br />

PPR-2 Attestation Mechanism: An attestation mechanism is implemented that provides<br />

an eective assurance of the tamper-evidence and con<strong>for</strong>mance with the evaluated<br />

state of the smart card.<br />

PPR-3 Authenticated & Valid CRP: To provide online device authentication and validation,<br />

the card manufacturer maintains a valid CRP database corresponding to<br />

individual smart cards.<br />

PPR-4 Unique Identier: Each smart card has a unique identier that it can use to authenticate<br />

itself to the card manufacturer.<br />

PPR-5 Pseudo Public Identier: Each smart card has a dynamic pseudo public identier<br />

that it uses to connect with the card manufacturer. Be<strong>for</strong>e issuing the smart cards<br />

to individual users, the card manufacturer will generate a unique pseudo identity<br />

<strong>for</strong> each card that will be updated on each successful execution of the attestation<br />

protocol.<br />

PPR-6 Smart Card Signature Key Pair: Each smart card will have a unique signature key<br />

pair that is bound to the attestation mechanism.<br />

PPR-7 Encryption & MAC Keys: The smart card manufacturer shares a unique encryption<br />

and MAC key with each of their individual smart cards. These keys are used to<br />

encrypt and MAC the communication messages between the smart card and its<br />

manufacturer.<br />

4.7.2 Protocol Goals<br />

The goals <strong>for</strong> the attestation protocol are listed as below:<br />

PG-1 Secrecy: During the attestation protocol, the communication messages are adequately<br />

protected.<br />

PG-2 Privacy: In the attestation protocol, the identity smart card owner (user) should<br />

not be revealed to any eavesdropper or the card manufacturer.<br />

4.7.3 Intruder's Capabilities<br />

The aim of an adversary A could be to retrieve enough in<strong>for</strong>mation to enable him to<br />

successfully masquerade as a card manufacturer or as a smart card. There<strong>for</strong>e, we assume<br />

102

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!