06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

7.6 Application Binding Protocol Distributed<br />

this process will be simple as SCA already trusts that particular evaluation laboratory.<br />

Otherwise, it will request the CAMS to traverse the certicate chain to nd out whether<br />

the SCA's evaluation laboratory is part of that certicate chain. Even if this fails, the SCA<br />

can request its card manufacturer to decide whether it should proceed with the binding<br />

or not depending upon the provided certicate. There<strong>for</strong>e, only if SCA can successfully<br />

ascertain the validity of the certicate provider of the SCB's certicate will it proceed<br />

with the protocol.<br />

PBP-5. SCA : cfa = h(g r SCB||g r SCA||N SCB ||N SCA )<br />

SCA : V al SCA = Sign SCA (cfa||SCA i ||SCB i ||U i )<br />

SCA : mE = e kSCA−SCB (V R||V al SCA ||CertS SCA )<br />

SCA → SCB : mE||f mkSCA−SCB (mE)<br />

In response, the SCA will proceed with a plat<strong>for</strong>m assurance and validation mechanism<br />

(section 4.4). On successful completion, the SCA will generate a message V al SCA . In the<br />

message V al SCA , the SCA appends identities of both smart cards and user along with cfa.<br />

The signed message (V al SCA ) is appended by the certicate and encrypted and MACed<br />

by the session keys.<br />

The SCB veries the SCA's signature and then validates the CertS SCA . To verify the<br />

certicate chain, the SCB will iteratively employ a similar procedure to SCA discussed<br />

as part of the message four. The SCB will also verify the identity of the user of the SCA.<br />

The SCB will record whether the user's identity is the same <strong>for</strong> both smart cards or not.<br />

This in<strong>for</strong>mation will be used by applications to decide whether they would like to establish<br />

a communication link with an application installed on a dierent user's smart card.<br />

PBP-6. SCB : V al SCB = Sign SCB (cfb||SCA||SCB||U i )<br />

SCB : mE = e kSCA−SCB (V al SCB )<br />

SCB → SCA : mE||f mkSCA−SCB (mE)<br />

The SCB will initiate the plat<strong>for</strong>m assurance and validation mechanism which generates<br />

the hash value of the critical components of the SCB. It will append the Die-Hellman<br />

exponentials, random numbers and identities of communicating smart cards and the current<br />

owner of the SCB. The entire message is signed by the SCB then encrypted and MACed<br />

by the session keys.<br />

7.6 Application Binding Protocol Distributed<br />

The Application Binding Protocol Distributed (ABPD) is similar the ABP that we<br />

discussed in section 7.4. The subtle dierence between these two protocols is that the<br />

178

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!