06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6.2 Secure Channel Protocols<br />

Notation Description<br />

g r X<br />

Denotes the Die-Hellman exponential generated by the entity X with<br />

random number r X . We use this notation to represent the g r X<br />

mod p,<br />

where g and p are system parameters that are represented by the Die-<br />

Hellman group selected by the entity X. For further discussion please<br />

refer to [132, 146, 181]<br />

K Denotes the shared secret generated by the communicating entities using<br />

the Die-Hellman scheme. Keys <strong>for</strong> application download and session<br />

keys are generated from this shared secret.<br />

ek X−Y Denotes the session encryption key shared between entities X and Y to<br />

be used with a symmetric algorithm.<br />

mk X−Y Denotes the session MAC key shared between entities X and Y.<br />

h(Z) Represents the result of generating a hash of data Z by a hash function<br />

(e.g. SHA256 [147]).<br />

U Cre <strong>User</strong> authentication credential (e.g. login and password) associated with<br />

a particular SP.<br />

X Sup Denotes the supported features of entity X that include Die-Hellman<br />

groups [148], user authentication mechanisms (i.e. login/password), symmetric<br />

and signature algorithms.<br />

AU X A signed message from an entity X that authenticates it to other entities.<br />

SI Session cookie generated by the respective SP. It indicates the session<br />

in<strong>for</strong>mation and facilitates protection against DoS attacks, possibly along<br />

with providing the facility of protocol session resumption.<br />

V R Validation request sent by an SP to a smart card. In response, the smart<br />

card provides the security and reliability assurance to the SP.<br />

ADP The Application Download Protocol (ADP) will include appropriate parameters<br />

<strong>for</strong> the application download protocol, which in the context of<br />

this thesis is the GlobalPlat<strong>for</strong>m application download process based on<br />

the symmetric key cryptosystem (e.g. SCP03) [170].<br />

ALP The Application Lease Policy (ALP) species the minimum security, reliability<br />

and operational requirements imposed by the SP on a smart<br />

card. The ALP also includes the relevant application's details that include<br />

application size and functionality support requirements.<br />

hs & hp hs is a hash message generated by the SC on data including its identity,<br />

generated Die-Hellman exponentials and random numbers. Similarly,<br />

hp is generated by the SP. Both these messages aim to avoid a man-inthe-middle<br />

attack on the proposed protocols.<br />

134

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!