Skip to main content

2004 | OriginalPaper | Buchkapitel

How to Disembed a Program?

verfasst von : Benoît Chevallier-Mames, David Naccache, Pascal Paillier, David Pointcheval

Erschienen in: Cryptographic Hardware and Embedded Systems - CHES 2004

Verlag: Springer Berlin Heidelberg

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

This paper presents the theoretical blueprint of a new secure token called the Externalized Microprocessor (XμP). Unlike a smart-card, the XμP contains no ROM at all.While exporting all the device’s executable code to potentially untrustworthy terminals poses formidable security problems, the advantages of ROM-less secure tokens are numerous: chip masking time disappears, bug patching becomes a mere terminal update and hence does not imply any roll-out of cards in the field. Most importantly, code size ceases to be a limiting factor. This is particularly significant given the steady increase in on-board software complexity.After describing the machine’s instruction-set we introduce a public-key oriented architecture design which relies on a new RSA screening scheme and features a relatively low communication overhead. We propose two protocols that execute and dynamically authenticate arbitrary programs, provide a strong security model for these protocols and prove their security under appropriate complexity assumptions.

Metadaten
Titel
How to Disembed a Program?
verfasst von
Benoît Chevallier-Mames
David Naccache
Pascal Paillier
David Pointcheval
Copyright-Jahr
2004
Verlag
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-540-28632-5_32