Skip to main content

Secure Software Smartcard Resilient to Capture

  • Conference paper
  • 1223 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3802))

Abstract

We present a simple secure software smartcard that can be immunized against offline dictionary attack when the adversary captures the device. The proposed scheme also provides proactive security for the device’s private key, i.e., proactively updates to the remote server and device to eliminate any threat of offline dictionary attacks due to previously compromised devices.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hoover, D., Kausik, B.: Software smart cards via cryptographic camouflage. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy (SSP 1999), Washington, Brussels, Tokyo, pp. 208–215. IEEE, Los Alamitos (1999)

    Google Scholar 

  2. MacKenzie, P., Reiter, M.: Networked cryptographic devices resilient to capture. International Journal of Information Security 2, 1–20 (2003)

    Article  Google Scholar 

  3. Kwon, T.: Robust software tokens: Towards securing a digital identity (2001)

    Google Scholar 

  4. MacKenzie, P., Reiter, M.K.: Two-party generation of DSA signatures. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 137–154. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  5. Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive secret sharing or: How to cope with perpetual leakage. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 339–352. Springer, Heidelberg (1995)

    Google Scholar 

  6. Ostrovsky, R., Yung, M.: How to withstand mobile virus attacks. In: Proc. 10th ACM Symp. on Principles of Distributed Computation, pp. 51–59 (1991)

    Google Scholar 

  7. Herzberg, A., Jakobsson, M., Jarecki, S., Krawczyk, H., Yung, M.: Proactive public key and signature systems. In: ACM Conference on Computer and Communications Security, pp. 100–110 (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jung, S.W., Ruland, C. (2005). Secure Software Smartcard Resilient to Capture. In: Hao, Y., et al. Computational Intelligence and Security. CIS 2005. Lecture Notes in Computer Science(), vol 3802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596981_13

Download citation

  • DOI: https://doi.org/10.1007/11596981_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30819-5

  • Online ISBN: 978-3-540-31598-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics