Abstract
We present a simple secure software smartcard that can be immunized against offline dictionary attack when the adversary captures the device. The proposed scheme also provides proactive security for the device’s private key, i.e., proactively updates to the remote server and device to eliminate any threat of offline dictionary attacks due to previously compromised devices.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Hoover, D., Kausik, B.: Software smart cards via cryptographic camouflage. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy (SSP 1999), Washington, Brussels, Tokyo, pp. 208–215. IEEE, Los Alamitos (1999)
MacKenzie, P., Reiter, M.: Networked cryptographic devices resilient to capture. International Journal of Information Security 2, 1–20 (2003)
Kwon, T.: Robust software tokens: Towards securing a digital identity (2001)
MacKenzie, P., Reiter, M.K.: Two-party generation of DSA signatures. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 137–154. Springer, Heidelberg (2001)
Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive secret sharing or: How to cope with perpetual leakage. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 339–352. Springer, Heidelberg (1995)
Ostrovsky, R., Yung, M.: How to withstand mobile virus attacks. In: Proc. 10th ACM Symp. on Principles of Distributed Computation, pp. 51–59 (1991)
Herzberg, A., Jakobsson, M., Jarecki, S., Krawczyk, H., Yung, M.: Proactive public key and signature systems. In: ACM Conference on Computer and Communications Security, pp. 100–110 (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jung, S.W., Ruland, C. (2005). Secure Software Smartcard Resilient to Capture. In: Hao, Y., et al. Computational Intelligence and Security. CIS 2005. Lecture Notes in Computer Science(), vol 3802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596981_13
Download citation
DOI: https://doi.org/10.1007/11596981_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30819-5
Online ISBN: 978-3-540-31598-8
eBook Packages: Computer ScienceComputer Science (R0)