Abstract
Smart card technology is relatively new but offers an economic and convenient solution to the problems of user-authentication. This paper discusses the requirements for user authentication and digital signature in complex networks and examines the problems of integrating a smart-card sub-system. It proposes some design approaches for providing a useful lifetime for a smart card and for handling the computations required for 512-bit RSA digital signatures.
Chapter PDF
Similar content being viewed by others
Keywords
- Smart Card
- Digital Signal Processor
- Message Authentication Code
- Smart Card Reader
- Acceptable Response Time
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Bibliography
Anura GURUGE, “SNA-Theory and Practice”, Pergamon Infotech, 1984
“IBM Cryptographic Subsystem Concepts and Facilities”, (GC22-9063), 1985
“IBM RACF”, Datapro Reports on Information Security, Report No. IS52-504, McGraw Hill, 1987
“CA-ACF2”, Datapro Reports on Information Security, Report No. IS52-187, McGraw Hill, 1988
“IBM 3848 Cryptographic Unit Product Description and Operating Procedures”, (GA22-7073), 1982
“IBM OS/VSI and OS/VS2 MVS Programmed Cryptographic Facility, General Information”, (GC28-0942), 1980
“ACF/VTAM General Information”, (GC38-0254), 1980
Andrew CLARK, “Physical Protection of Cryptographic Devices”, Eurocrypt’ 87, Amsterdam, 1987
Andrew CLARK, “Physical Protection of Cryptographic Devices (Revised)”, Proc. of Corporate Computer Security’ 88 Conference, Brighton, UK 1988
“Information Processing-Data Encryption Algorithm”, ANSI X3.92, 1981
“Data Encryption Algorithm-Modes of Operation”, ANSI X3.106, 1983
Ronald RIVEST, Adi SHAMIR and Leonard ADLEMAN, “A Method of Obtaining Digital Signatures and Public Key Cryptosystems”, Comm. of ACM, Vol.21, No.2 Feb 1978
John SHERWOOD, “Digital Signature Schemes Using Smart Cards”, Proc. of Smart Card’ 88 Conference, London, 1988
John SHERWOOD, “Automatic Key Management for Transparent Security on Corporate Data Networks”, Proc. of International Systems Security Conference, London, 1986
Paul BARRETT, “Implementing the RSA Public Key Encryption Scheme on a Digital Signal Processor”, Proc. of Crypto’ 86, Springer-Verlag, 1986
Amos FIAT and Adi SHAMIR, “How to prove yourself: Practical Solutions to Identification and Signature Problems”, Proc. of Crypto’ 86, Springer-Verlag, 1986
Amos FIAT and Adi SHAMIR, “Unforgeable Proofs of Identity”, 5th SECURICOM, Paris, 1987
Tsutomu MATSUMOTO, Koki KATO and Hideki IMAI, “Speeding-Up Secret Computations with Insecure Auxiliary Devices”, CRYPTO’ 88-to appear
Raymond WONG, Thomas BERSON and Richard FEIERTAG, “Polonius: An Identity Authentication System”, Proc. of IEEE Symposium on Security and Privacy, 1985
Carl MEYER and Stephen MATYAS, “Cryptography: A New Dimension in Computer Data Security”, Wiley, 1982
Raymond EISELE, “Host Access Security”, Presented at Interact’ 86, Orlando, Florida, 1986
Vince GALLO and Andrew CLARK, “Issue Authority”, 2nd Nordic Conference on Information Security, Stockholm, 1988
“Financial Institution Key Management (Wholesale)”, ANSI X9.17, 1985
“Financial Institution Message Authentication (Wholesale)”, ANSI X9.9, 1984
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1990 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sherwood, J.R., Gallo, V.A. (1990). The Application of Smart Cards for Rsa Digital Signatures in a Network Comprising Both Interactive and Store-and-Forward Facilities. In: Goldwasser, S. (eds) Advances in Cryptology — CRYPTO’ 88. CRYPTO 1988. Lecture Notes in Computer Science, vol 403. Springer, New York, NY. https://doi.org/10.1007/0-387-34799-2_34
Download citation
DOI: https://doi.org/10.1007/0-387-34799-2_34
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-97196-4
Online ISBN: 978-0-387-34799-8
eBook Packages: Springer Book Archive