06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6.6 Analysis of the Proposed Protocols<br />

The AD will sign the message that includes the transaction certicate of the charge applied<br />

by the AD. The payment details (pd) includes the charge method (chm), charge value (chv)<br />

and payment method (pm). Finally, the AD also generate the SID (SID ′ AD−SC) and SC i ′<br />

to be used in the subsequent session.<br />

After the SC receives the ActApp, it will activate the application and notify the cardholder<br />

about the successful outcome of the application installation, and any charge that was<br />

incurred by the AD. The charging mechanism <strong>for</strong> the individual transactions is at the sole<br />

discretion of the AD. This message also acts as proof of the transaction.<br />

6.6 Analysis of the Proposed Protocols<br />

In this section, we discuss the proposed protocols in terms of in<strong>for</strong>mal, and <strong>for</strong>mal mechanical<br />

analysis using CasperFDR. Later, we detail the test implementations and experimental<br />

results.<br />

6.6.1 In<strong>for</strong>mal Analysis of the Proposed Protocols<br />

In this section, we in<strong>for</strong>mally discuss the requirements <strong>for</strong> the STCPs namely STCP SP ,<br />

STCP SC and STCP ACA .<br />

6.6.1.1 One to Twelve<br />

In this section, we consistently refer to the protocol requirements and goals in section 6.2.3<br />

with their respective numbers as listed in the same section. There<strong>for</strong>e, from here onward,<br />

any reference to a goal or requirement number refers to the listed item in section 6.2.3.<br />

During the STCP protocols, the message AU X where X = SC, SP and U, authenticates<br />

communicating entities satisfying the SOG-1. To satisfy the SOG-2, all communicating<br />

entities exchange cryptographic certicates that also facilitate in entity authentication process.<br />

The proposed STCPs satisfy requirements SOG35 and SOG12 by rst requiring the SP to<br />

generate the Die-Hellman exponentials as it is computationally more powerful than the<br />

smart card. If the smart card generates the exponential be<strong>for</strong>e the SP then it can choose<br />

a weak key; however, as smart cards are computationally restricted devices they cannot<br />

per<strong>for</strong>m such tasks. After generation of session keys, communicating entities use them to<br />

146

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!