Skip to main content

Public-key cryptography on smart cards

  • Conference paper
  • First Online:
Cryptography: Policy and Algorithms (CPA 1995)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1029))

Included in the following conference series:

  • 270 Accesses

Abstract

Only recently, high performance smart card implementations of public key algorithms have reached the market, opening a new field of applications for such systems. We will survey the mathematical techniques behind this development, compare digital signature schemes in view of smart card implementations, discuss security management issues of smart card production, and present three applications to demonstrate the use of smart cards for security purposes.

This author's research supported by EPSRC Case Award No. 93315080 and Zergo Ltd.

This author's research supported by a Lloyd's of London Tercentenary Foundation Research Fellowship.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. E.F.Brickell, A fast modular multiplication algorithm with application to two key cryptography, Proc. of Crypto'82, pp. 51–60, 1982.

    Google Scholar 

  2. J.Burns and C.J.Mitchell, Parameter Selection for Server-Aided RSA Computation Schemes, IEEE Trans. on Computers, Vol. 43, pp. 163–174, 1994.

    Google Scholar 

  3. D.deWaleffe and J.-J.Quisquater, CORSAIR: A Smart Card for Public Key Crytposystems, Proc. of Crypto'90, Springer LNCS 537, pp. 502–513, 1991.

    Google Scholar 

  4. W.Diffie and M. E.Hellman, New directions in cryptography, IEEE Trans. Inform. Theory, IT-22, pp. 644–654, 1976.

    Google Scholar 

  5. T.ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Inform. Theory, IT-31, pp. 469–472, 1985.

    Google Scholar 

  6. A.Fiat and A.Shamir, How to prove yourself: Practical solutions to identification and signature problems, Proc. of Crypto'86, Springer LNCS 263, pp. 186–194, 1987.

    Google Scholar 

  7. FIPS PUB XX, February 1, 1993, Digital Signature Standard, 1993.

    Google Scholar 

  8. M.Gasser and E.McDermott, An Architecture for Practical Delegation in a Distributed System, Proceedings of the IEEE Symposium on Security and Privacy, Oakland, pp. 20–30, 1990.

    Google Scholar 

  9. L.C.Guillou and J.-J.Quisquater, A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory, Proc. of Eurocrypt'88, Springer LNCS 330, pp. 123–128, 1988.

    Google Scholar 

  10. L.C.Guillou, M.Ugon and J.-J.Quisquater, The Smart Card: A Standardized Security Device Dedicated to Public Cryptography, in G.J.Simmons, editor, Contemporary Cryptology, IEEE Press, 1991.

    Google Scholar 

  11. J.Hashkes and M.Cohen, Managing Smart Cards for Pay Television, The Video-Crypt Approach, Seminar on Conditional Access for Audiovisual Services, Rennes, France, 12–14 June 1990 (ACSA '90).

    Google Scholar 

  12. Hitachi Europe Ltd., em IC Card Devices — Towards 2000, presented at Smart Card 95, London, 1995.

    Google Scholar 

  13. ISO 7816-1:1987 Identification cards — Integrated circuit(s) with contacts — Part 1: Physical characteristics, Geneva: International Organization for Standardization, 1987.

    Google Scholar 

  14. ISO 7816-2:1988 Identification cards — Integrated circuit(s) cards with contacts — Part 2: Dimensions and location of the contacts Geneva: International Organization for Standardization, 1988.

    Google Scholar 

  15. ISO/IEC 7816-3:1989 Identification cards — Integrated circuit(s) cards with contacts — Part 3: Electronic signals and transmission protocols, Geneva: International Organization for Standardization, 1989.

    Google Scholar 

  16. ISO/IEC Draft International Standard 13818-1, Information technology — Generic coding of moving pictures and associated audio information — Systems, Geneva: International Organization for Standardization.

    Google Scholar 

  17. J.Jedwab and C.J.Mitchell, Minimum weight modified signed-digit representations and fast exponentiation, Electronics Letters, Vol. 25, pp. 11171–2, 1989.

    Google Scholar 

  18. H.-J.Knobloch, A Smart Card Implementation of the Fiat-Shamir Identification Scheme, Proc. of Eurocrypt'88, Springer LNCS 330, pp. 87–95, 1988.

    Google Scholar 

  19. M.Kuhn, Details.txt, ftp://cip.informatik.uni-erlangen.de/VideoCrypt/cardadapter.

    Google Scholar 

  20. C.-S.Laih, S.-M.Yen and L.Harn, Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence, Proc. of Asiacrypt'91, Springer LNCS 739, pp. 450–459, 1992.

    Google Scholar 

  21. B.A.LaMacchia and A.M.Odlyzko, Computation of Discrete Logarithms in Prime Fields, Designs, Codes and Cryptography, Vol. 1, No.1, pp. 47–62, 1991.

    Google Scholar 

  22. T.Matsumoto, K.Kato and H.Imai, Speeding up Secret Computations with insecure Auxiliary Devices, Proc. of Crypto'88, Springer LNCS 403, pp. 497–506, 1990.

    Google Scholar 

  23. P.L.Montgomery, Modular Multiplication Without Trial Division, Mathematics of Computation, Vol. 44, pp. 519–521, 1985.

    Google Scholar 

  24. G.Morgan, Smart Cards for Subscription Television: VideoCrypt — a Secure Solution, Proc. Smart Card '91, Agestream Ltd., Peterborough, UK, 1991.

    Google Scholar 

  25. D.Naccache, D.Raihi, D.Raphaeli and S.Vaudenay, Can D.S.A. be Improved?-Complexity Trade-Offs with the Digital Signature Standard, Proc. of Eurocrypt'94, Springer LNCS 950, pp. 77–85, 1995.

    Google Scholar 

  26. D.Naccache, Arithmetic Co-processors: The State of the Art, preprint, 1995.

    Google Scholar 

  27. M.J.Norris and G.J.Simmons, Algorithms for high-speed modular arithmetics, Congressus Numerantium, Vol. 31, pp. 151–163, 1981.

    Google Scholar 

  28. A.M.Odlyzko, Talk given at Hewlett-Packard Symposium on Information Security, Royal Holloway, University of London, 19 December, 1994.

    Google Scholar 

  29. P.Peyret, G.Lisimaque and T.Y.Chua, Smart Cards Provide Very High Security and Flexibility in Subscribers Management, IEEE Transactions on Consumer Electronics, Vol. 36, No.3, pp. 744–752, 1990.

    Google Scholar 

  30. B.Pfitzmann and M.Waidner, Attacks on Protocols for Server-Aided RSA Computation Protocols, Proc. of Eurocrypt'92, Springer LNCS 658, pp. 153–162, 1993.

    Google Scholar 

  31. K.C.Posch and R.Posch, Modulo Reduction in Residue Number Systems, IEEE Transactions on Parallel and Distributed Systems, Vol. 6, pp. 449–454, 1995.

    Google Scholar 

  32. J.-J.Quisquater and M.DeSoete, Speeding up smart card RSA computations with insecure coprocessors, D.Chaum, ed., Proc. of Smart Card 2000, Elsevier Science, Amsterdam, pp. 191–197, 1991.

    Google Scholar 

  33. G.W. Reitwieser, Binary Arithmetics, in Advances in Computers, F.L.Alt (ed), Vol.1, pp. 231–308, 1960.

    Google Scholar 

  34. R. L.Rivest and A.Shamir and L.Adleman, A method for btaining digital signatures and public key cryptosystems, Commun. ACM, ol. 21, pp. 120–126, 1978.

    Google Scholar 

  35. C.P.Schnorr, Efficient Identification and Signatures for Smart Cards, Proc. of Crypto'89, Springer LNCS 435, pp. 239–252, 1990.

    Google Scholar 

  36. H.Sedlak, The RSA cryptography processor, Proc. of Eurocrypt'87, Springer LNCS 304, pp. 95–105, 1987.

    Google Scholar 

  37. Siemens, ICs for Chip Cards-SLE44C200, Data Sheet 09.94, 1994.

    Google Scholar 

  38. A.Shimbo and S.Kawamura, Factorisation Attack on Certain Server-Aided Computation Protocols for the RSA Secret Transformation, Electronics Letters, Vol. 26, pp. 1387–1388, 1990.

    Google Scholar 

  39. A.Turbat, Introductory Remarks, Proc. of Eurocrypt'84, Springer LNCS 209, pp. 457–458, 1985.

    Google Scholar 

  40. N.Takagi and S.Yajima, Modular Multiplication Hardware Algorithms with a Redundant Representation and Their Application to the RSA Cryptosystem, IEEE Trans, on Computers, C-41, pp. 887–891, 1992.

    Google Scholar 

  41. Visa, Chip Cards: More power to the Cardholder, October 1994.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ed Dawson Jovan Golić

Rights and permissions

Reprints and permissions

Copyright information

© 1996 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fuchsberger, A., Gollmann, D., Lothian, P., Paterson, K.G., Sidiropoulos, A. (1996). Public-key cryptography on smart cards. In: Dawson, E., Golić, J. (eds) Cryptography: Policy and Algorithms. CPA 1995. Lecture Notes in Computer Science, vol 1029. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0032364

Download citation

  • DOI: https://doi.org/10.1007/BFb0032364

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-60759-5

  • Online ISBN: 978-3-540-49363-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics