06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

B.6 Application Binding Protocol Local<br />

AppI: ApplicationIdentity<br />

CARDID, SeudoAPPi: SeudoIdentities<br />

SmartCOS: SmartCardOS<br />

APP: SPApplication<br />

TEKEY, TAKEY : SessionKey<br />

InverseKeys = (TEKEY,TEKEY), (TAKEY,TAKEY)<br />

#Processes<br />

INITIATOR(SP, SPi, SC, <strong>User</strong>, gSP, nSP, App, Appi)knows SKey(SP), VKey<br />

RESPONDER(SC, SCi, SP, <strong>User</strong>, <strong>User</strong>i, TSM, TSMi, SeudoAppi, CardID, SCOS, gSC, nSC,\<br />

TEKey, TAKey) knows SKey(<strong>User</strong>), SKey(SC), VKey<br />

SERVER(TSM,TSMi, SC, SCi, <strong>User</strong>, CardID, nTSM, TEKey, TAKey)knows SKey(TSM), VKey<br />

#System<br />

INITIATOR(SProvider, ISProvider, SCard, USER, GSP, NSP, APP, AppI)<br />

RESPONDER(SCard, ISCard, SProvider, USER, IUSER, TrustedSM, ITrustedSM, SeudoAPPi,<br />

CARDID, SmartCOS, GSC, NSC, TEKEY, TAKEY)<br />

SERVER(TrustedSM,ITrustedSM, SCard, ISCard, USER, CARDID, NTSM, TEKEY, TAKEY)<br />

#Functions<br />

symbolic VKey, SKey<br />

#Intruder In<strong>for</strong>mation<br />

Intruder = MaliciousEntity<br />

IntruderKnowledge = {SProvider, SCard, MaliciousEntity, IMaliciousEntity, \<br />

GMalicious, NMalicious, SKey(MaliciousEntity), VKey}<br />

#Specification<br />

Aliveness(SP, SC)<br />

Aliveness(SC, SP)<br />

Aliveness(SC, TSM)<br />

Aliveness(TSM, SC)<br />

Agreement(SP, SC, [DHKey, EnKey, MaKey])<br />

StrongSecret(SP, Appi, [SC])<br />

StrongSecret(SC, Appi, [SP])<br />

StrongSecret(SP, <strong>User</strong>i, [SC])<br />

StrongSecret(SC, <strong>User</strong>i, [SP])<br />

#Equivalences<br />

<strong>for</strong>all x, y : Num . Exp(Exp(Gen, x), y) = Exp(Exp(Gen, y), x)<br />

B.6 Application Binding Protocol Local<br />

The Casper script in this section corresponds to the Application Binding Protocol Local<br />

(ABPL) described in section 7.4.<br />

#Free variables<br />

S, C, spS, spC : Agent<br />

TPM : Server<br />

nc, ns, nm : Nonce<br />

ksc, abKsc : SessionKey<br />

f : HashFunction<br />

ServerKey : Agent -> ServerKeys<br />

VKey : Agent -> Publickey<br />

247

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!