06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

7.3 UCTD Firewall<br />

Table 7.2: Protocol notation and terminology<br />

Notation Description<br />

SE Represents the server application.<br />

CL Represents the client application.<br />

T EM Represents the TEM on a smart card.<br />

F Represents the UCTD rewall on a smart card.<br />

K A−B Long term symmetric key shared between entity A and B.<br />

KS−C<br />

t Session key generated by the TEM.<br />

E K (Z) Represents symmetric encryption of the data Z with the key K<br />

N X + num Random number of entity X is incremented by the value of num, where<br />

num = 0, 1, 2, 3, .....<br />

X|Y Represents the XOR binary operation on the data items X, Y.<br />

IMA X Integrity Measurement Authorisation message generated by entity X.<br />

V RE X Application assurance validation response generated by the TEM <strong>for</strong><br />

entity X.<br />

AP Represents the authentication process a server application requires from<br />

the respective client application, when requesting the shareable resources.<br />

OR Represents the object reference to the server application's resource manager<br />

(i.e. ARM).<br />

7.3.8 Protocol Notation and Terminology<br />

In this section, we list the notation used to describe the protocols in this chapter. The<br />

notation listed in table 7.2 is an extension to the notation described in tables 4.2 and 6.1.<br />

7.3.9 Enrolment Process<br />

During the enrolment process, the SPs of a client and server application agree on the<br />

business and technical terms <strong>for</strong> sharing their application resources on a UCTD.<br />

Common Criteria<br />

Certification Body<br />

Application Assurance<br />

Certificate (AAC)<br />

Server Application’s<br />

Service Provider’s<br />

certificate<br />

Client Application’s<br />

Service Provider’s<br />

Certificate<br />

Application Certificate<br />

(Includes <strong>User</strong> details)<br />

Figure 7.9: Hierarchy of a client application's certicate<br />

In this process, an SP of a client application provides assurance and validation from a<br />

173

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!