Skip to main content

Secure Internet Smartcards

  • Conference paper
  • First Online:
Java on Smart Cards:Programming and Security (JavaCard 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2041))

Included in the following conference series:

Abstract

Smartcards have traditionally been isolated from computer networks, communicating exclusively with the host computers to which they are attached. As a result, users can only use smartcards on local hosts. This can be disturbing in typical office environments, where a user has multiple workstations, or uses remote workstations as well as local ones. The most straightforward way of addressing this problem would be a remote smartcard access mechanism that allows users to use remote smartcards as if they are local. However, there are two issues that are incurred by going remote, i.e., security and naming. Communication between an application and a smartcard goes through the Internet, and can be sniffed. Also, if a smartcard is identified by the name of the host, the smartcard’s name changes every time it moves from a host to another.

In this paper, we describe middleware that solves these problems. Our work extends the Internet infrastructure for smartcards, which has recently been developed by Guthery et al. [9] and Rees et al. [20]. It addresses the security problem by encrypting communication with the session key established by the Simple Password Exponential Key Exchange (SPEKE). As a result, it is secure against off-line dictionary attack and man-in-the-middle attack. It also provides convenient naming by embracing the domain name service.

We have implemented two applications, Kerberos and SSH, on this infrastructure to illustrate its usability. Thanks to the object oriented programming mechanisms of Java Card and the UDP based interface of the infrastructure, it is straightforward to implement such applications. The performance of this system is less than ideal, as it takes more than 10 seconds to complete an authentication session.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bastiaan Bakker. Mutual authentication with smart cards. In Proceedings of USENIX Workshop on Smartcard Technology, May 1999.

    Google Scholar 

  2. Steven M. Bellovin and Michael Merritt. Encrypted key exchange: Password-based protocols secure against dictionary attacks. In Proceedings IEEE Computer Society Symposium on Research in Security and Privacy, pages 72–84, Oakland, CA, May 1992.

    Google Scholar 

  3. David Cocoran. Movement for the use of smart cards in a linux environment. http://www.linuxnet.com/.

  4. Dorothy Denning. Cryptography and Data Security. Addison-Wesley, 1983.

    Google Scholar 

  5. W. Diffie and M. E. Hellman. New directions in cryptography. In IEEE Trans. Inform. Theory, volume IT-22, Nov 1976.

    Google Scholar 

  6. Europay, MasterCard, and Visa. Emv’96: Integrated circuit card application specification for payment systems, June 1996. http://www.mastercard.com/emv/emvspecs02.html.

  7. The gnu multiple precision arithmetic library. http://www.swox.com/gmp/.

  8. S. Guthery, Y. Baudoin, J. Posegga, and J. Rees. IP and ARP over ISO 7816-3 (Internet Draft), February 2000.

    Google Scholar 

  9. Scott Guthery. How to turn a gsm sim into a web server. In CARDIS 2000, Bristol, UK, September 2000.

    Google Scholar 

  10. Scott B. Guthery and Timothy M. Jurgensen. Smart Card Developer’s Kit. MacMillan Technical Publishing, Indianapolis, Indiana, December 1997.

    Google Scholar 

  11. N. Haller. The s/key one-time password system, RFC 1760, Feb. 1995.

    Google Scholar 

  12. N. Haller and C. Metz. A one-time password system, RFC 1938, May 1996.

    Google Scholar 

  13. Naomaru Itoi and Peter Honeyman. Smartcard integration with Kerberos V5. In Proceedings of USENIX Workshop on Smartcard Technology, Chicago, May 1999.

    Google Scholar 

  14. David P. Jablon. Strong password-only authenticated key exchange. ACM Computer Communications Review, October 1996.

    Google Scholar 

  15. SET Secure Electronic Transaction LLC. Set standard technical specifications, 1999. http://www.setco.org/.

  16. Stephan Lucks. Open key exchange: How to defeat dictionary attacks without encrypting public keys. In The Security Protocol Workshop’ 97, Ecole Normale Superieure, April 1997.

    Google Scholar 

  17. Ian Miller and Mr. Tines. Ctc library. http://www.bifroest.demon.co.uk/ctc/manuals/ctclib.htm.

  18. Paul Mockapetris. Domain names-concepts and facilities, STD 13, RFC 1034, Nov. 1987.

    Google Scholar 

  19. C. Perkins. Ip mobility support. Network Working Group Request for Comments: 2002, October 1996.

    Google Scholar 

  20. Jim Rees and Peter Honeyman. Webcard: A Java Card web server. In CARDIS 2000, Bristol, UK, September 2000.

    Google Scholar 

  21. Bruce Schneier. Applied Cryptography. John Wiley & Sons, Inc., 2 edition, 1996.

    Google Scholar 

  22. P. Vixie, S. Thomson, Y. Rekhter, and J. Bound. Dynamic updates in the domain name system (dns update). Network Working Group Request for Comments: 2136, April 1997.

    Google Scholar 

  23. Eric Young. libdes des library. ftp://ftp.psy.uq.oz.au/pub/Crypto/DES/.

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Itoi, N., Fukuzawa, T., Honeyman, P. (2001). Secure Internet Smartcards. In: Attali, I., Jensen, T. (eds) Java on Smart Cards:Programming and Security. JavaCard 2000. Lecture Notes in Computer Science, vol 2041. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45165-X_6

Download citation

  • DOI: https://doi.org/10.1007/3-540-45165-X_6

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42167-2

  • Online ISBN: 978-3-540-45165-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics