Skip to main content

Implementation of a Provably Secure, Smartcard-Based Key Distribution Protocol

  • Conference paper
Smart Card Research and Applications (CARDIS 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1820))

Abstract

We describe the implementation of the Shoup-Rubin key distribution protocol. This protocol stores long-term keys on a smartcard and uses the cryptographic capability of the card to generate and distribute session keys securely. The designers of the protocol provide a mathematical proof of its security, using techniques pioneered by Bellare and Rogaway. Combining this theoretical strength with our implementation on tamper resistant hardware results in practical and powerful middleware functionality, useful in applications that demand strong authentication and confidentiality.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Morris, R., Thompson, K.: Password Security: A Case History. Communications of the ACM 22(11) (November 1979)

    Google Scholar 

  2. Needham, R.M., Schroeder, M.D.: Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM 21(12) (December 1978)

    Google Scholar 

  3. Shoup, V., Rubin, A.D.: Session Key Distribution Using Smart Cards. In: Proc. of Eurocrypt 1996 (May 1996)

    Google Scholar 

  4. Bellare, M., Rogaway, P.: Provably Secure Session Key Distribution: The Three Party Case. In: Proc. ACM 27th Ann. Symp. on the Theory of Computing (1995)

    Google Scholar 

  5. Schneier, B.: Applied Cryptography, Second Edition. John Wiley & Sons, Inc., Chichester (1996)

    Google Scholar 

  6. Leighton, T., Micali, S.: Secret-Key Agreement Without Public-Key Cryptography. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 456–479. Springer, Heidelberg (1994)

    Google Scholar 

  7. Linn, J.: Generic Security Service Application Program Interface, Version 2. RFC 2078, USC/Information Sciences Institute, January 10 (1997)

    Google Scholar 

  8. Honeyman, P., Adamson, A., Coffman, K., Janakiraman, J., Jerdonek, R., Rees, J.: Secure Videoconferencing. In: Proc. 7th USENIX Security Symp., San Antonio, pp. 123–130 (January 1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jerdonek, R., Honeyman, P., Coffman, K., Rees, J., Wheeler, K. (2000). Implementation of a Provably Secure, Smartcard-Based Key Distribution Protocol. In: Quisquater, JJ., Schneier, B. (eds) Smart Card Research and Applications. CARDIS 1998. Lecture Notes in Computer Science, vol 1820. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10721064_21

Download citation

  • DOI: https://doi.org/10.1007/10721064_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67923-3

  • Online ISBN: 978-3-540-44534-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics