Abstract
We describe the implementation of the Shoup-Rubin key distribution protocol. This protocol stores long-term keys on a smartcard and uses the cryptographic capability of the card to generate and distribute session keys securely. The designers of the protocol provide a mathematical proof of its security, using techniques pioneered by Bellare and Rogaway. Combining this theoretical strength with our implementation on tamper resistant hardware results in practical and powerful middleware functionality, useful in applications that demand strong authentication and confidentiality.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Morris, R., Thompson, K.: Password Security: A Case History. Communications of the ACM 22(11) (November 1979)
Needham, R.M., Schroeder, M.D.: Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM 21(12) (December 1978)
Shoup, V., Rubin, A.D.: Session Key Distribution Using Smart Cards. In: Proc. of Eurocrypt 1996 (May 1996)
Bellare, M., Rogaway, P.: Provably Secure Session Key Distribution: The Three Party Case. In: Proc. ACM 27th Ann. Symp. on the Theory of Computing (1995)
Schneier, B.: Applied Cryptography, Second Edition. John Wiley & Sons, Inc., Chichester (1996)
Leighton, T., Micali, S.: Secret-Key Agreement Without Public-Key Cryptography. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 456–479. Springer, Heidelberg (1994)
Linn, J.: Generic Security Service Application Program Interface, Version 2. RFC 2078, USC/Information Sciences Institute, January 10 (1997)
Honeyman, P., Adamson, A., Coffman, K., Janakiraman, J., Jerdonek, R., Rees, J.: Secure Videoconferencing. In: Proc. 7th USENIX Security Symp., San Antonio, pp. 123–130 (January 1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jerdonek, R., Honeyman, P., Coffman, K., Rees, J., Wheeler, K. (2000). Implementation of a Provably Secure, Smartcard-Based Key Distribution Protocol. In: Quisquater, JJ., Schneier, B. (eds) Smart Card Research and Applications. CARDIS 1998. Lecture Notes in Computer Science, vol 1820. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10721064_21
Download citation
DOI: https://doi.org/10.1007/10721064_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67923-3
Online ISBN: 978-3-540-44534-0
eBook Packages: Springer Book Archive