06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

7.5 Plat<strong>for</strong>m Binding Protocol<br />

Following message four (ABPL-4); the SE veries the hash value of the CL to be the same<br />

as the value listed either by the SE's SP or by a CC evaluation authority. It then generates<br />

an application-binding key and encrypts it with the session key. In addition, the message<br />

contains the object reference to the SE's shared resources and access permissions. The<br />

CL directly calls the SE's shared resource in all subsequent requests, using the binding<br />

key <strong>for</strong> authentication and authorisation.<br />

ABPL-6. CL → SE : CL i ||SE i ||e KSE−CL (AP ||(N CL |N SE ) + 1)<br />

This message gives the assurance to the SE that the CL also has the same key, thus<br />

achieving mutual key conrmation (SOG-6: section 6.2.3).<br />

7.5 Plat<strong>for</strong>m Binding Protocol<br />

The Plat<strong>for</strong>m Binding Protocol (PBP) is executed between two smart cards that are listed<br />

as SCA and SCB. Both smart cards can be part of the same CAMS or they may be<br />

associated with two dierent CAMS and this is accommodated by the protocol described<br />

in section 7.5.2.<br />

7.5.1 Protocol Prerequisite<br />

The protocol prerequisite <strong>for</strong> the PBP is fundamentally dierent from the ones discussed<br />

be<strong>for</strong>e, as most of them focused on the smart card applications whereas the PBP is focused<br />

on the smart card itself. The prerequisite <strong>for</strong> the PBP is listed below:<br />

PPR-17 Syndicated Members: Both smart cards are registered with a CDAM network,<br />

either directly to the same CAMS or two dierent CAMS on separate devices (e.g.<br />

mobile phones, personal computers).<br />

7.5.2 Protocol Description<br />

The protocol can be initiated by any smart card; however, in this section we take SCA as<br />

the initiator of the PBP.<br />

PBP-1. SCA : SCA cm = h(N SCA ||g r SCA||SCB ′ i )<br />

SCA → SCB : SCA ′ i ||SCB′ i ||N SCA||SCA cm ||SCA Sup<br />

176

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!