Abstract
This paper makes simple observation on security of the networked cryptographic device resilient to capture that was developed to protect user’s private keys by software-only techniques. That scheme provided valuable features for secure generation of digital signatures or decryption of messages in a way of retaining a password-protected private key in a user-controlled device. The key idea was to exploit network connectivity rather than tamper-resistance of the device for securing the private key in software. However, we have found a few weak points that are not negligible in some sense. It was difficult to protect the private key in software even with provable security. So, we will describe such difficulties and provide possible solutions in this paper. Also the networked cryptographic devices will be augmented in that fashion.
Original language | English |
---|---|
Title of host publication | Information Security - 5th International Conference, ISC 2002, Proceedings |
Editors | Agnes Hui Chan, Virgil Gligor |
Publisher | Springer Verlag |
Pages | 17-31 |
Number of pages | 15 |
ISBN (Print) | 3540442707, 9783540442707 |
DOIs | |
Publication status | Published - 2002 |
Event | 5th International Conference on Information Security, ISC 2002 - Sao Paulo, Brazil Duration: 2002 Sept 30 → 2002 Oct 2 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 2433 |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Other
Other | 5th International Conference on Information Security, ISC 2002 |
---|---|
Country/Territory | Brazil |
City | Sao Paulo |
Period | 02/9/30 → 02/10/2 |
Bibliographical note
Publisher Copyright:© Springer-Verlag Berlin Heidelberg 2002.
All Science Journal Classification (ASJC) codes
- Theoretical Computer Science
- Computer Science(all)