06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

6.5 Application Acquisition and Contractual Agreement Protocol<br />

STCP ACA -1. SP : SI = f kSP (g r SP<br />

||N SP ||SC IP )<br />

SP → SC : SP i ||N SP ||g r SP<br />

||SP Sup ||V R||ALP ||SI<br />

SC : K = (g r SP<br />

) r SC<br />

mod p<br />

SC : k SC−SP = H K (N SP ||N SC || ′ 1 ′ )<br />

SC : mk SC−SP = H K (N SP ||N SC || ′ 2 ′ )<br />

The SP will initiate the STCP ACA by generating a random number (N SP ) and Die-<br />

Hellman exponential (g r SP ). It appends the generated values with the SPSup and associated<br />

ALP.<br />

When the SC receives the message, it check whether it can meet the SP's ALP and support<br />

features from the SP Sup list. The SC will then generate the shared secret and required<br />

session encryption and MAC keys.<br />

STCP ACA -2. SC : hs = h(SC i ||SP i ||g r SC<br />

||g r SP<br />

||N SC ||N SP )<br />

SC : AU SC = Sign SC (V M||SC i ||SP i ||hs)<br />

SC : mE = ek SC−SP (AU SC ||OP ||CertS SC )<br />

SC → SP : N SC ||g r SC<br />

||SC Config ||mE||f mkSC−SP (mE)||SI<br />

The SC will generate a random number (N SC ) and Die-Hellman exponential (g r SC ).<br />

Subsequently, the SC will proceed with generating the AU SC and may include V M depending<br />

upon the SP's requirement (e.g. online or oine attestation) pointed out in the<br />

SP Sup . If the SP is a member of the AD syndicate, the SC will include an OP containing<br />

the certicate issued to the SC by the AD. Each SC has a list of members associated<br />

with the respective AD, which can be regularly updated by the AD.<br />

On receipt of the STCP ACA -2, the SP will rst verify the session cookie and the SC's<br />

capabilities listed in SC Config . The SP will then generate the shared secret and session<br />

keys similar to the SC. Subsequently, it will verify the MAC and decrypt the message.<br />

The SP then veries the generated signature and V M (if required); if successful the SP<br />

will proceed with the protocol.<br />

STCP ACA -3. SP : hp = h(SP i ||SC i ||g r SC<br />

||g r SP<br />

||N SC ||N SP )<br />

SP : AU SP = Sign SP (SP i ||SC i ||App i ||hp)<br />

SP : mE = ek SC−SP (AU SP ||CertS SP ||OC)<br />

SP → SC : mE||f mkSC−SP (mE)||SI<br />

The SP will generate an encrypted and MACed message that contains AU SP , SP's certicate,<br />

and an optional certicate OC. The optional certicate eld is used by the SP if its<br />

application also has a third party evaluation certicate (AAC: section 4.4.2). The AU SP<br />

includes the identities of the SP and the respective application along with hp.<br />

143

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!