06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

A.4 ASPeCT Protocol<br />

A.4 ASPeCT Protocol<br />

The ASPeCT protocol is designed as part of the European Commission ACTS project<br />

ASPeCT [232], which focuses on the mobile network environment <strong>for</strong> value-added transactions.<br />

Earlier versions of the ASPeCT protocol is proposed in Martin et al. [176], and<br />

Horn and Preneel [177]. However, in this section we describe the protocol as it is detailed<br />

in the Horn et al. [168]. Additional notations required <strong>for</strong> the description of the ASPeCT<br />

are as below:<br />

ID T identier of the smart card's certication authority.<br />

CertSt certied (static) public key agreement key (g SP ) of the SP.<br />

h1, h2, h3 one-way hash functions, that are detailed in Horn and Preneel [177].<br />

cd details of the charging data.<br />

T S time stamp.<br />

py payment conrmation.<br />

ASPeCT-1. SC → SP : g SC ||ID T<br />

SP : k SC−SP = h1(N SP ||(g SC ) SP )<br />

The SC generates a Die-Hellman exponential g SC and append it with the identity of the<br />

smart card's certication authority (ID T ). On receipt of this message, the SP generates<br />

the shared secret key by using the g SC , public key agreement key g SP along with a random<br />

number generated by the SP .<br />

ASPeCT-2. SP → SC : N SP ||h2(k SC−SP ||N SP ||S i )||CertSt<br />

SC : k SC−SP = h1(N SP ||(g SP ) SC )<br />

SC : H = h3(g SC ||g SP ||N SP ||ID SP ||cd||T S||py)<br />

In response, the SP adds the random number N SP appended with the hash generated by<br />

the function h2 on the generated key (<strong>for</strong> key authentication), N SP , and identity of the<br />

SP. Finally, appending the certicate of the public key agreement key (e.g. g SP ).<br />

On reception of the second message, the SC retrieves the public key agreement key (g SP )<br />

and then follow the similar steps like SP to generate the shared secret key. After generating<br />

the k SC−SP , the SC will authenticate the shared key by generating the hash with function<br />

h2 and match with the one received in the message 2. If it matches then SC got the key<br />

authentication from the SP.<br />

The SC will then generate the transaction that includes the several elements from the<br />

rst two message along with the charging details associated with the particular SC, which<br />

contains the time stamp and payment details (py). All these elements are then hashed<br />

using the function h3 and the output is referred as H.<br />

ASPeCT-3. SC → SP : e kSC−SP (Sign SC (H)||CertS SC , py)<br />

In response, the SC will sign the H (that is used as non-repudiation of the transaction).<br />

It then appends the signature key certicate <strong>for</strong> the SC and payment details. The entire<br />

message is then encrypted by the shared secret key.<br />

234

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!