06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

A.3 Aziz-Die (AD) Protocol<br />

on the public keys generated by both communicating entities. The public key, encrypted<br />

signature and the certicate <strong>for</strong> the SP is sent to the SC. The certicate is sent in<br />

plaintext; there<strong>for</strong>e, in this protocol there is no privacy protection <strong>for</strong> the SP (i.e. which<br />

is not necessary to have as most of the servers have public addresses: Internet addresses).<br />

The SC will generate the shared secret key similar to the SP (in previous message). The<br />

SC will decrypt the signature and then verify the signature on the public keys generated<br />

by the both SP and SC. This is to avoid man-in-the-middle attack.<br />

STS-3. SC → SP : e kSC−SP (Sign SC (g SP ||g SC )||CertS SC )<br />

The SC will sign the public keys generated by the SC and SP then append the certicate.<br />

The entire message is then encrypted by the shared secret key k SC−SP . This message<br />

provides mutual entity authentication, and mutual explicit key authentication along with<br />

preventing the man-in-the-middle attack.<br />

A.3 Aziz-Die (AD) Protocol<br />

The AD protocol was proposed <strong>for</strong> the wireless local area networks [175] and unlike STS<br />

it does not rely on the Die-Hellman exponentials to generate the shared secretes.<br />

AD-1. SC → SP : CertE SC ||CertS SC ||N SC<br />

The AD protocol is started by the SC that generates a random number N SC , append it<br />

with the SC encryption key pair certicate.<br />

AD-2. SP → SC : zV SC (N SP )||CertE SP ||CertS SP ||Sign SP (zV SC (N SP )||N SC )<br />

On receiving the rst message, the SP will generate a random number N SP and encrypt<br />

it with the SC's public key. It then appends the signature key pair certicate along with<br />

a signed message that includes the encrypted random number of the SP along with the<br />

random number sent by the SC.<br />

AD-3. SC → SP : zV SP (r<br />

SC ′ )||Sign SC(zV SP (r<br />

SC ′ )||zV SC(N SP ))<br />

SC, SP : k SC−SP = r<br />

SC ′ + N SP<br />

The SC, on receiving the second message will rst decrypt the SP's random number and<br />

then veries the signature. Subsequently, the SC generates another random number r<br />

SC.<br />

′<br />

Now the SC can now generate the shared key k SC−SP by adding the r<br />

SC ′ with the SP's<br />

random number.<br />

The SC will encrypt the r ′ SC<br />

with the public key of the SP and generate a signature on<br />

the encrypted random numbers from SC and SP. On receipt, the SP can also generate<br />

the shared secret k SC−SP as the SC has generated it.<br />

233

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!