06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

C.8 Application Binding Protocol - Distributed<br />

190 0x01 ) ;<br />

191 pMessage [ 0 ] = ( byte ) U t i l . arrayCopyNonAtomic ( ClientRandomNumber ,<br />

192 ( short ) 0 , pMessage , ( short ) pMessage [ 0 ] , ( short )<br />

193 ClientRandomNumber . l e n g t h ) ;<br />

194 generateEncryption ( ( short ) 4 , ( short ) 64 , TpmClientApp ) ;<br />

195 pMessage [ 0 ] = ( byte ) U t i l . arrayCopyNonAtomic ( scTPMDigestBuffer ,<br />

196 ( short ) 0 , pMessage , ( short ) 68 , ( short )<br />

197 scTPMDigestBuffer . l e n g t h ) ;<br />

198 pMessage [ 0 ] += ( byte ) sessionKey . getKey ( pMessage , ( short )<br />

199 pMessage [ 0 ] ) ;<br />

200 ServerRandomNumber [ 1 5 ] = (byte ) ( ServerRandomNumber [ 1 5 ] + (byte ) 1) ;<br />

201 pMessage [ 0 ] = ( byte ) U t i l . arrayCopyNonAtomic ( ServerRandomNumber ,<br />

202 ( short ) 0 , pMessage , ( short ) pMessage [ 0 ] , ( short )<br />

203 ServerRandomNumber . l e n g t h ) ;<br />

204 generateEncryption ( ( short ) 68 , ( short ) 64 , TpmServerApp ) ;<br />

205 }<br />

206 public void g e n e r a t e D e c r y t i o n ( short s t a r t , short length , AESKey Key)<br />

207 {<br />

208 byte [ ] tempBuff = JCSystem . makeTransientByteArray ( length ,<br />

209 JCSystem .MEMORY_TYPE_TRANSIENT_DESELECT) ;<br />

210 AESCipher . i n i t (Key , Cipher .MODE_DECRYPT) ;<br />

211 U t i l . arrayCopyNonAtomic ( pMessage , ( short ) s t a r t , tempBuff , ( short )<br />

212 0 , ( short ) l e n g t h ) ;<br />

213 AESCipher . doFinal ( tempBuff , ( short ) 0 , ( short ) length , pMessage ,<br />

214 ( short ) s t a r t ) ;<br />

215 }<br />

216 public void generateEncryption ( short s t a r t , short length , AESKey<br />

217 Key) {<br />

218 AESCipher . i n i t (Key , Cipher .MODE_ENCRYPT) ;<br />

219 short paddingbytes = ( short ) ( l e n g t h % 16) ;<br />

220 byte [ ] temp = JCSystem . makeTransientByteArray ( ( short ) ( l e n g t h +<br />

221 paddingbytes ) , JCSystem .MEMORY_TYPE_TRANSIENT_DESELECT) ;<br />

222 U t i l . arrayCopyNonAtomic ( pMessage , s t a r t , temp , ( short ) 0 , l e n g t h ) ;<br />

223 i f ( paddingbytes != 0) {<br />

224 <strong>for</strong> ( short i = 0 ; i < paddingbytes ; i ++, l e n g t h++) {<br />

225 temp [ l e n g t h ] = ( byte ) 0xFF ;<br />

226 }<br />

227 }<br />

228 pMessage [ 1 ] = ( byte ) AESCipher . doFinal ( temp , ( short ) 0 , length ,<br />

229 pMessage , s t a r t ) ;<br />

230 }<br />

231 }<br />

C.8 Application Binding Protocol - Distributed<br />

The Java Card implementation of the ABP D discussed in section 7.6 is listed in subsequent<br />

sections.<br />

377

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!