06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 6<br />

Secure and Trusted Channel Protocol<br />

Contents<br />

6.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128<br />

6.2 Secure Channel Protocols . . . . . . . . . . . . . . . . . . . . . . 129<br />

6.3 Secure and Trusted Channel Protocol Service Provider . . 136<br />

6.4 Secure and Trusted Channel Protocol Smart Card . . . . . 139<br />

6.5 Application Acquisition and Contractual Agreement Protocol 141<br />

6.6 Analysis of the Proposed Protocols . . . . . . . . . . . . . . . . . 146<br />

6.7 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155<br />

In this chapter, we begin with a discussion of secure channel protocols that are used <strong>for</strong><br />

entity authentication and key establishment <strong>for</strong> internet services. We discuss the security<br />

and operational goals that a secure channel protocol has to accomplish in the UCTD environment.<br />

We propose two protocols that closely adhere to the UCOM philosophy and<br />

a protocol related to the CASC that involves an administrative authority (e.g. TSM). An<br />

in<strong>for</strong>mal analysis is provided <strong>for</strong> the proposed protocols followed by a mechanical <strong>for</strong>mal<br />

analysis using CasperFDR. Finally, we describe a prototype implementation of the proposed<br />

protocols, and give per<strong>for</strong>mance measurements obtained from this implementation.<br />

127

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!