06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CONTENTS<br />

C.4 Secure and Trusted Channel Protocol Service Provider . . . . . . . . . . 290<br />

C.4.1 Smart Card Implementation . . . . . . . . . . . . . . . . . . . . . . . 290<br />

C.4.2 Service Provider Implementation . . . . . . . . . . . . . . . . . . . . 304<br />

C.5 Secure and Trusted Channel Protocol Smart Card . . . . . . . . . . . . . 313<br />

C.5.1 Smart Card Implementation . . . . . . . . . . . . . . . . . . . . . . . 313<br />

C.5.2 Service Provider Implementation . . . . . . . . . . . . . . . . . . . . 325<br />

C.6 Application Acquisition and Contractual Agreement Protocol . . . . . . . . 333<br />

C.6.1 Smart Card Implementation . . . . . . . . . . . . . . . . . . . . . . . 333<br />

C.6.2 Service Provider Implementation . . . . . . . . . . . . . . . . . . . . 350<br />

C.6.3 Administrative Authority Implementation . . . . . . . . . . . . . . . 359<br />

C.7 Application Binding Protocol - Local . . . . . . . . . . . . . . . . . . . . . . 364<br />

C.7.1 Client Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365<br />

C.7.2 Server Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369<br />

C.7.3 TEM Handler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373<br />

C.8 Application Binding Protocol - Distributed . . . . . . . . . . . . . . . . . . 377<br />

C.8.1 Client Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378<br />

C.8.2 Server Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392<br />

C.9 Plat<strong>for</strong>m Binding Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404<br />

C.9.1 Initiator Smart Card Implementation . . . . . . . . . . . . . . . . . . 404<br />

C.9.2 Responder Smart Card Implementation . . . . . . . . . . . . . . . . 418<br />

C.10 Abstract Virtual Machine . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430<br />

C.11 Implementation Helper Classes . . . . . . . . . . . . . . . . . . . . . . . . . 433<br />

C.11.1 Protocol Cryptographic Support . . . . . . . . . . . . . . . . . . . . 433<br />

C.11.2 CAMS Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . 439<br />

C.11.3 Die-Hellman Group . . . . . . . . . . . . . . . . . . . . . . . . . . 443<br />

C.11.4 SHA256 Pseudorandom Number Generator . . . . . . . . . . . . . . 445<br />

Bibliography 450<br />

13

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!