Skip to main content
Erschienen in: World Wide Web 2/2020

22.08.2019

Secure limitation analysis of public-key cryptography for smart card settings

verfasst von: Youliang Tian, Qiuxian Li, Jia Hu, Hui Lin

Erschienen in: World Wide Web | Ausgabe 2/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Smart cards are widely used in high security applications due to their self-contained nature. At the same time, the security of smart card has become an urgent problem in the field of intelligent environment. Public-key Cryptography is the main means to solve the security problems based on smart card password authentication and identity authentication protocol. This paper reviews the security issues of public key cryptography used in smart cards from the perspective of information theory. By constructing a attackers channel, we model the Public-key Cryptography process in the way of an adversary to capture the attack ability in the Public-key Cryptography setting. Then, we convert the secure problems of Public-key Cryptography into the attack channels capacity of adversaries that the maximum value of the average mutual information is the secure limitations of a Public-key Cryptography scheme, which is a reachable theoretic limitation of secure communication parties. Finally, we give the bounds of insecure for public-key encryption and signature in different secure levels, and analyze and discuss the secure limitation.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
2.
Zurück zum Zitat Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the 1st ACM conference on computer and communications security. pp. 62–73. CCS ’93. https://doi.org/10.1145/168588.168596. ACM, New York (1993) Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the 1st ACM conference on computer and communications security. pp. 62–73. CCS ’93. https://​doi.​org/​10.​1145/​168588.​168596. ACM, New York (1993)
3.
Zurück zum Zitat Boyen, X., Mei, Q., Waters, B.: Direct chosen ciphertext security from identity-based techniques. In: Proceedings of the 12th ACM conference on computer and communications security. pp. 320–329. CCS ’05. https://doi.org/10.1145/1102120.1102162. ACM, New York (2005) Boyen, X., Mei, Q., Waters, B.: Direct chosen ciphertext security from identity-based techniques. In: Proceedings of the 12th ACM conference on computer and communications security. pp. 320–329. CCS ’05. https://​doi.​org/​10.​1145/​1102120.​1102162. ACM, New York (2005)
4.
Zurück zum Zitat Camenisch, J., Shoup, V.: Practical verifiable encryption and decryption of discrete logarithms. In: Boneh, D. (ed.) Advances in cryptology - CRYPTO 2003, pp 126–144. Springer Berlin Heidelberg, Berlin (2003)CrossRef Camenisch, J., Shoup, V.: Practical verifiable encryption and decryption of discrete logarithms. In: Boneh, D. (ed.) Advances in cryptology - CRYPTO 2003, pp 126–144. Springer Berlin Heidelberg, Berlin (2003)CrossRef
5.
Zurück zum Zitat Chang, C. C., Wu, T. C.: Remote password authentication with smart cards. IEEE Proc.-E 138(3), 165–168 (1991) Chang, C. C., Wu, T. C.: Remote password authentication with smart cards. IEEE Proc.-E 138(3), 165–168 (1991)
6.
Zurück zum Zitat Chien, H. Y., Jan, J. K., Tseng, Y. M.: An efficient and practical solution to remote authentication: Smart card. Comput. Secur. 21(4), 372–375 (2002)CrossRef Chien, H. Y., Jan, J. K., Tseng, Y. M.: An efficient and practical solution to remote authentication: Smart card. Comput. Secur. 21(4), 372–375 (2002)CrossRef
7.
Zurück zum Zitat Coron, J.: Resistance against differential power analysis for elliptic curve cryptosystems. In: International workshop on cryptographic hardware and embedded systems (1999)CrossRef Coron, J.: Resistance against differential power analysis for elliptic curve cryptosystems. In: International workshop on cryptographic hardware and embedded systems (1999)CrossRef
8.
Zurück zum Zitat Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H (ed.) Advances in Cryptology — CRYPTO ’98, pp 13–25. Springer, Berlin (1998)CrossRef Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H (ed.) Advances in Cryptology — CRYPTO ’98, pp 13–25. Springer, Berlin (1998)CrossRef
9.
Zurück zum Zitat Cramer, R., Hanaoka, G., Hofheinz, D., Imai, H., Kiltz, E., Pass, R., Shelat, A., Vaikuntanathan, V.: Bounded cca2-secure encryption. In: Proceedings of the advances in crypotology 13th international conference on theory and application of cryptology and information security. pp. 502–518. ASIACRYPT’07. http://dl.acm.org/citation.cfm?id=1781454.1781497. Springer-Verlag, Berlin (2007)CrossRef Cramer, R., Hanaoka, G., Hofheinz, D., Imai, H., Kiltz, E., Pass, R., Shelat, A., Vaikuntanathan, V.: Bounded cca2-secure encryption. In: Proceedings of the advances in crypotology 13th international conference on theory and application of cryptology and information security. pp. 502–518. ASIACRYPT’07. http://​dl.​acm.​org/​citation.​cfm?​id=​1781454.​1781497. Springer-Verlag, Berlin (2007)CrossRef
11.
Zurück zum Zitat Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: Concrete results. Ches May 2162, 251–261 (2001)MATH Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: Concrete results. Ches May 2162, 251–261 (2001)MATH
12.
Zurück zum Zitat Hsiang, H. C., Shih, W. K.: Improvement of the secure dynamic id based remote user authentication scheme for multi-server environment. Computer Standards and Interfaces 31(6), 1118–1123 (2009)CrossRef Hsiang, H. C., Shih, W. K.: Improvement of the secure dynamic id based remote user authentication scheme for multi-server environment. Computer Standards and Interfaces 31(6), 1118–1123 (2009)CrossRef
13.
Zurück zum Zitat Izu, T., Takagi T.: A fast parallel elliptic curve multiplication resistant against side channel attacks (2002)CrossRef Izu, T., Takagi T.: A fast parallel elliptic curve multiplication resistant against side channel attacks (2002)CrossRef
15.
Zurück zum Zitat Joye, M., Yen, S. M.: The montgomery powering ladder. In: International workshop on cryptographic hardware and embedded systems (2002) Joye, M., Yen, S. M.: The montgomery powering ladder. In: International workshop on cryptographic hardware and embedded systems (2002)
16.
Zurück zum Zitat Kocher, P. C.: Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. In: International cryptology conference on advances in cryptology (1996) Kocher, P. C.: Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. In: International cryptology conference on advances in cryptology (1996)
17.
Zurück zum Zitat Kocher, P. C., Jaffe, J., Jun, B.: Differential power analysis. Proc. Crypto. 1666, 388–397 (1999)MATH Kocher, P. C., Jaffe, J., Jun, B.: Differential power analysis. Proc. Crypto. 1666, 388–397 (1999)MATH
18.
Zurück zum Zitat Mamiya, H., Miyaji, A., Morimoto, H.: Efficient Countermeasures against RPA, DPA and SPA (2004) Mamiya, H., Miyaji, A., Morimoto, H.: Efficient Countermeasures against RPA, DPA and SPA (2004)
19.
Zurück zum Zitat Messerges, T. S.: Using second-order power analysis to attack dpa resistant software. In: International workshop on cryptographic hardware and embedded systems (2000)CrossRef Messerges, T. S.: Using second-order power analysis to attack dpa resistant software. In: International workshop on cryptographic hardware and embedded systems (2000)CrossRef
20.
Zurück zum Zitat Messerges, T. S., Dabbish, E. A., Sloan, R. H.: Investigations of power analysis attacks on smartcards. In: Usenix workshop on smartcard technology on usenix workshop on smartcard technology (1999) Messerges, T. S., Dabbish, E. A., Sloan, R. H.: Investigations of power analysis attacks on smartcards. In: Usenix workshop on smartcard technology on usenix workshop on smartcard technology (1999)
21.
22.
Zurück zum Zitat Moebius, N., Stenzel, K., Borek, M., Reif, W.: Incremental development of large, secure smart card applications. In: Workshop on model-driven security (2012) Moebius, N., Stenzel, K., Borek, M., Reif, W.: Incremental development of large, secure smart card applications. In: Workshop on model-driven security (2012)
24.
Zurück zum Zitat Park, J. W., Sherman, M., Colombo, M., Roberts, L. R., Schwartz, M. E., Degos, F., Chen, P. J., Chen, M., Kudo, M., Johnson, P. J., Huang, B., Orsini, L. S.: Observations of hepatocellular carcinoma (hcc) management patterns from the global hcc bridge study: First characterization of the full study population. J. Clin. Oncol. 30(15), 4033–4033 (2012) Park, J. W., Sherman, M., Colombo, M., Roberts, L. R., Schwartz, M. E., Degos, F., Chen, P. J., Chen, M., Kudo, M., Johnson, P. J., Huang, B., Orsini, L. S.: Observations of hepatocellular carcinoma (hcc) management patterns from the global hcc bridge study: First characterization of the full study population. J. Clin. Oncol. 30(15), 4033–4033 (2012)
25.
Zurück zum Zitat Qi, J., Ma, J., Wei, F.: On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst. J. PP(99), 1–4 (2016) Qi, J., Ma, J., Wei, F.: On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst. J. PP(99), 1–4 (2016)
26.
Zurück zum Zitat Quisquater, J. J., Samyde, D.: Electromagnetic analysis (ema): Measures and counter-measures for smart cards. In: International conference on research in smart cards: Smart card programming and security (2001) Quisquater, J. J., Samyde, D.: Electromagnetic analysis (ema): Measures and counter-measures for smart cards. In: International conference on research in smart cards: Smart card programming and security (2001)
28.
Zurück zum Zitat Schneier, B.: Applied cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. John Wiley & Sons, Inc., New York (1995)MATH Schneier, B.: Applied cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. John Wiley & Sons, Inc., New York (1995)MATH
30.
Zurück zum Zitat Tunstall, M.: Smart card security. Smart Cards Tokens Security and Applications 3, 195–228 (2014) Tunstall, M.: Smart card security. Smart Cards Tokens Security and Applications 3, 195–228 (2014)
32.
Zurück zum Zitat Waters, B.: Efficient identity-based encryption without random oracles. In: Proceedings of the 24th annual international conference on theory and applications of cryptographic techniques. pp. 114–127. EUROCRYPT’05. Springer-Verlag, Berlin (2005) Waters, B.: Efficient identity-based encryption without random oracles. In: Proceedings of the 24th annual international conference on theory and applications of cryptographic techniques. pp. 114–127. EUROCRYPT’05. Springer-Verlag, Berlin (2005)
Metadaten
Titel
Secure limitation analysis of public-key cryptography for smart card settings
verfasst von
Youliang Tian
Qiuxian Li
Jia Hu
Hui Lin
Publikationsdatum
22.08.2019
Verlag
Springer US
Erschienen in
World Wide Web / Ausgabe 2/2020
Print ISSN: 1386-145X
Elektronische ISSN: 1573-1413
DOI
https://doi.org/10.1007/s11280-019-00715-8

Weitere Artikel der Ausgabe 2/2020

World Wide Web 2/2020 Zur Ausgabe

Premium Partner