Abstract
Smart card secure channel protocols based on public key cryptography are not widely utilised mainly due to processing overheads introduced in the underlying smart card microprocessors and the complexities introduced by the operation of a PKI infrastructure. In this paper we analyse the significance of public key secure channel protocols in multi application smart cards. We believe that multi application smart card technology (e.g. the GlobalPlatform smart card specification) should benefit more from the advantages of public key cryptography specifically for the initiation and maintenance of a secure channel. This paper introduces a public key based cryptographic protocol for secure entity authentication, data integrity and data confidentiality. The proposed secure channel protocol uses a combination of public key, secret key and the main idea behind the Diffie-Hellmann key establishment protocols in order to achieve the desired goals.
Key words
Download to read the full chapter text
Chapter PDF
References
PC/SC Workgroup, “Specifications for PC-ICC Interoperability”, www. smart cardsys .com
OpenCard Consortium, “OpenCard Framework Specification OCF”, www. opencard.org
B. Schneier, Applied Cryptography, Second Edition, John Wiley & Sons, 1996.
W. Rankl, W. Effmg, “Smart Card Handbook“, John Willey and Sons, 1997.
A. Menezes, P. van Oorschot, S. Vanstone, “Handbook of Applied Cryptography”, Boca Raton CRC Press, 1997.
G1obalPlatform, “Open Platform Card Specification”, Version 2.1. June 2001. http://www.globalplatform.org.
P. H. Hartel and E. K. de Jong Frz. “Smart cards and card operating systems”. In J. Bartlett, editor, UNIFORUM’96, pages 725–730, San-Francisco, California, Feb 1996. Uniforum, Santa Clara, California.
Constantinos Markantonakis, “The Case for a Secure Multi-Application Smart Card Operating System”, Springer-Verlag Lecture Notes in Computer Science Vol. 1396.
Javasoft, “Java cardPlatform Specifications”, Version 2.2, September 2002, http://java.sun.com/products/javacard/specs.html
Microsoft, “Windows for Smart Card”, http://www.microsoft.com/HWDEV/TECH /input/smartcard/
MAOSCO, “MULTOS Reference Manual Ver 1.2”, http://www.multos.com/
International Organization for Standardization, Genève, Switzerland. ISO/IEC 7816–4, Information technology—Identification cards—Integrated circuit(s) cards with contacts—Part 4: Interindustry commands for interchange, 1995.
W. Diffie and M. Hellman, “New directions in cryptography”, IEEE Transactions on Information Theory, 22:644–654, 1976.
R. Ferreira, R. Malzahn, P. Marissen, J.-J. Quisquater and T. Wille, “FAME: A 3rd generation coprocessor for optimising public key cryptosystems in smart card applications”, Smart card Research and Advanced Applications — Cardis ’96, Publ. Stichting Mathematisch Centrum, pp. 59–72, 1996.
T. Boogaerts, “Implementation of Elliptic curves cryptosystems for smart cards”, CARDIS 1998, 14–16th September 1998.
Helena Handschuch, Pascal Paillier, “Smart Card Cryptoprocessors for Public Key Cryptography”, In Springer Verlag. Third Smart Card Research and Advanced Application Conference- CARDIS’98, September 1998.
Guillou L.C, Ugon M, Quisquater J.J, 1991, “The Smart card (A standardised Security Device Dedicated to public Cryptology)”, Contemporary Cryptology: The science of Information Integrity, ISBN 0879422777.
Gemplus, GemXpressoRAD, Gemplus, 2003.
Giesecke & Devrient, StarSIM Developer Suite, G&D 2003.
Jean-Sébastien Coron, Marc Joye, David Naccache, and Pascal Paillier, “Universal padding schemes for RSA” in Yung, Ed., Advances in Cryptology CRYPTO 2002, vol. 2442 of Lecture Notes in Computer Science, pp. 226–241, Springer-Verlag, 2002
Sébastien Coron, David M’Ráïhi, and Christophe Tymen, “Fast generation of pairs (k,[k]P) for Koblitz elliptic curves” by Jean In S. Vaudenay and A.M. Youssef, Eds., Selected Areas in Cryptography, vol. 2259 of Lecture Notes in Computer Science, pp. 151–164, Springer-Verlag, 2001
Marc Joye, Pascal Paillier, and Serge Vaudenay “Efficient generation of prime numbers” In Ç.K. Koç and C. Paar, Eds., Cryptographic Hardware and Embedded Systems — CHES 2000, vol. 1965 of Lecture Notes in Computer Science, pp. 340–354, Springer-Verlag, 2000
R. Ferreira, R. Malzahn, P. Marissen, Jean-Jacques Quisquater, T. Wille, FAME: A 3rd generation coprocessor for optimising public key cryptosystems in smart card applications, In P. H. Hartel et al., editor(s), Smart card Research and Advanced Applications – Cardis ’96, pages 59–72, 1996
UCL, “A Smarter Chip for Smart cards”, http://www.dice.ucl.ac.be/cascade, 1996
Konstantinos Markantonakis, “Secure Log File Download Mechanisms for Smart Cards”, Third Smart card Research and Advanced Application Conference (CARDIS’98) , September 14–16 1998, UCL Louvain-La-Neuve-Belgium, Final proceedings to be published by Lecture Notes in Computer Science, volume 1820.
ISO/IEC 11770–3, “Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques”, ISO 1999.
Laura Geele Wang, “Smart Visa and Java Technology”, http://java.sun.com/ features/2001/06/visa.html , June 04, 2001
3GPP, “GSM 03.48 Digital cellular telecommunications system, SIM Toolkit Secure Messaging”, http://www.3gpp.org/ft.p/tsg_cn/WG4_protocollars/Temp/ SMG%2323/TDocs/P-97–790.pdf
ISO/IEC 11770–1, “Information technology — Security techniques — Key management — Part 1: Framework”, 1996
ITU-T X.509, “The directory — Public key and attribute certificate frameworks”, (2000)
Helena Handschuh, Pascal Paillier, “Smart Card Crypto-Coprocessors for PublicKey Cryptography”, The Technical Newsletter RSA Laboratories, Vol 1, Number 1, Summer 1998
Konstantinos Markantonakis, “Is the Performance of the Cryptographic Functions the Real Bottleneck?”, IFIP TC 11 16th International Conference on Information Security (IFIP/SEC’01), June 11–13, 2001, Paris, France, In “Trusted Information: The New Decade Challenge” , Kluwer Academic Publishers, ISBN 0–7923–7389–8, pages 77–92
Colin Boyd, Anish Mathuria, “Protocols for Authentication and Key Establishment”, Springer Verlag in Information Security and Cryptography, June 15, 2003
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 IFIP International Federation for Information Processing
About this paper
Cite this paper
Rantos, K., Markantonakis, K. (2004). An Asymmetric Cryptography Secure Channel Protocol for Smart Cards. In: Deswarte, Y., Cuppens, F., Jajodia, S., Wang, L. (eds) Security and Protection in Information Processing Systems. SEC 2004. IFIP — The International Federation for Information Processing, vol 147. Springer, Boston, MA. https://doi.org/10.1007/1-4020-8143-X_23
Download citation
DOI: https://doi.org/10.1007/1-4020-8143-X_23
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-8016-1
Online ISBN: 978-1-4020-8143-9
eBook Packages: Springer Book Archive