06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

6.3 Secure and Trusted Channel Protocol Service Provider<br />

PrA-3 Secure Cryptographic Algorithms: The cryptographic algorithms used in the protocol<br />

that include symmetric, asymmetric, and signature algorithms are secure against<br />

a computationally bound adversary.<br />

6.3 Secure and Trusted Channel Protocol Service Provider<br />

In this section, we begin the discussion with a description of the proposed STCP SP along<br />

with the rejection messages.<br />

6.3.1 Protocol Prerequisites<br />

The prerequisites to the STCP SP are listed below. This is an extension to the prerequisite<br />

list in section 4.7.1.<br />

PPR-8 <strong>User</strong> Signature Key Pair: When a user has taken ownership of a smart card and on<br />

the successful conclusion of this process, the smart card generates a user signature<br />

key pair. This key pair is used to provide proof of ownership during the STCP SP .<br />

PPR-9 Authorised Customer: The user is a registered customer of the SP, which means<br />

that the SP has sanctioned the user to download (lease) their application.<br />

PPR-10 Established Connection: The user has the knowledge of the respective SP's application<br />

server (AMS: gure 3.6) that the SP has provided to the smart card. The<br />

smart card in return connects with the SP. Furthermore, the SP has knowledge of<br />

the smart card's Internet Protocol (IP) address.<br />

6.3.2 Protocol Description<br />

In this protocol, the SP takes the role of the protocol initiator. The design of this STCP<br />

variant is inspired by the requirements of user authentication as discussed in section 5.4.4.<br />

STCP SP -1. SP : SI = f kSP (g r SP<br />

||N SP ||SC IP )<br />

SP → SC : SP i ||V R||N SP ||g r SP<br />

||SP Sup ||SP Sel ||SI<br />

SC : K = (g r SP<br />

) r SC<br />

mod p<br />

SC : ek SC−SP = H K (N SP ||N SC || ′ 1 ′ )<br />

SC : mk SC−SP = H K (N SP ||N SC || ′ 2 ′ )<br />

136

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!