Abstract
Nowadays, cryptographic devices are widely used, so how to assess the security of them becomes a pivotal issue. There are two conventional ways to do this, by analyzing the underlying cryptographic protocols or by estimating if the devices meet standards such as FIPS 140-2 or Common Criteria Standard Documents. However, neither of them provides a comprehensive view of the security of the devices.
In this paper, we first propose a bottom-up method to prove the UC (Universally Composable) security of the cryptographic devices composed by hardware, software and protocols, and give a general security framework of them. Base on the framework, we present a method that describes the local physical security of cryptographic SoC hardware as UC security. Then we establish the equivalence of software codes and the real-world models in the condition of “Exactly Realize”, which illustrate the UC security of software. Besides, we propose methods to construct UC secure cryptographic modules from UC secure cryptographic SoC and a further method to construct UC secure cryptographic devices. Furthermore, based on the idea of bottom-up, we can develop new UC secure cryptographic devices which are more powerful by the combination of the existed UC secure cryptographic devices.
Supported by the National Natural Science Foundation of China (NSFC Grant No.61072047), Innovation Scientists and Technicians Troop Construction Projects of Zhengzhou City (096SYJH21099), and the Open Project Program of Key Lab of Cryptologic Technology and Information Security (Shandong University), Ministry of Education, China.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Beijing Huaqi Information Digital Technology Company: Introduction of Aigo USB Flash Disk L8267 Secure Version (2010), http://www.aigo.com/
Bell, D.E., La Padula L.J.: Secure computer system: A Mathematical Model. Hanscom AFB, Bedford, MA, Rep. ESD-TR-73-278, vol. 2, ESD/AFSC (1973)
Biba, K.J.: Integrity Considerations for Secure Computer Systems. ESD-TR-76-372, ESD/AFSC, Hanscom AFB, Bedford, MA (1977)
Burrow, M., Abadi, M., Needham, R.: A Logic of Authentication. Proceedings of the Royal Society of London, Series A, Mathematical and Physical Sciences 426(1871), 233–271 (1989)
Canetti R., Chari S., Halevi S., Pfitzmann B., et al.: Composable Security Analysis of OS Services. Cryptology ePrint Archive (2010), http://eprint.iacr.org/2010/213.pdf
Canetti, R., Halevi, S., Katz, J., Lindell, Y., MacKenzie, P.: Universally Composable Password-Based Key Exchange. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 404–421. Springer, Heidelberg (2005)
Canetti, R., Krawczyk, H.: Universally Composable Notions of Key Exchange and Secure Channels. In: Knudsen, L. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 337–351. Springer, Heidelberg (2002)
Canetti R.: Universal Composable Security: A New Paradigm for Cryptographic Protocols. In 42nd Annual Syposium on Foundations of Computer Science, pp. 136–145 (2001); An updated version is available from the Cryptology ePrint Archieve, Report 2000/067
Chari, S., Jutla, C., Rao, J., Rohatgi, P.: Towards Sound Approaches to Counteract Power-Analysis Attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 398–412. Springer, Heidelberg (1999)
Chen, H., Wagner, D.: MOPS: An Infrastructure for Examining Security Properties of Software. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 235–244. ACM Press, New York (2002)
Common Criteria Project/ISO: Common Criteria for Information Technology Security Evaluation Version 2.1 (ISO/IEC 15408) (1999), http://www.commoncriteria.org
Dolev, D., Yao, A.: On the Security of Public Key Protocols. IEEE Trans. on Information Theory 29(2), 198–208 (1983)
Ferguson, N., Schneier, B., Kohno, T.: Cryptography Engineering: Design Principles and Practical Applications. Wiley, Hoboken (2010)
Katz, J.: Universally Composable Multi-party Computation Using Tamper-Proof Hardware. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 115–128. Springer, Heidelberg (2007)
Kayem, A., Akl, S., Martin, P.: Adaptive Cryptographic Access Control. Springer, Heidelberg (2010)
Kingston Technology Corporation: DataTraveler Family - USB Flash Drives (2010), http://www.kingston.com/flash/datatraveler_home.asp
Koblitz, N., Menezes, A.: Another Look at Provable Security. Journal of Cryptology 20, 3–37 (2007)
Koc, C.K.: Cryptographic Engineering. Springer, Heidelberg (2008)
Li, Z., Zhang, L., Liu, Y.: Foundations of Cryptographic Engineering. Information Science and Technology Institute Press, Zhengzhou (2008)
Liao, W.-S., Hsiung, P.-A.: FVP: a Formal Verification Platform for SoC. In: Proceeding of IEEE International SOC Conference, pp. 21–24. IEEE Press, New York (2003)
Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer, Heidelberg (2007)
Marrero W., Clarke E., Jha S.: Model Checking for Cryptographic Protocols. In: Proc of DIMACS Workshop on Design and Formal Verification of Security Protocols, Piscataway, NJ, pp. 147–166 (1997)
Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
Murdoch, S., Drimer, S., Anderson, R., Bond, M.: Chip and PIN is Broken. In: IEEE Symposium on Security and Privacy, pp. 433–446. IEEE Press, New York (2010)
National Institute of Standards and Technology: FIPS 140-2: Security Requirement for Cryptogoraphic Modules (2001), http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf
Visa International: Visa Integrated Circuit Card - Card Specification, Version 1.4.0 (2001), http://www.scardsoft.com/documents/VISA/ICC_Card.pdf
Zhan, J., Sang, N., Xiong, G.: Formal Co-verification for SoC Design with Colored Petri Net. In: Wu, Z., Chen, C., Guo, M., Bu, J. (eds.) ICESS 2004. LNCS, vol. 3605, pp. 188–195. Springer, Heidelberg (2005)
The full version of this paper, http://www.mathmagic.cn/wanganl/ISPEC2011full.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, A., Li, Z., Yang, X., Yu, Y. (2011). A New Security Proof of Practical Cryptographic Devices Based on Hardware, Software and Protocols. In: Bao, F., Weng, J. (eds) Information Security Practice and Experience. ISPEC 2011. Lecture Notes in Computer Science, vol 6672. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21031-0_29
Download citation
DOI: https://doi.org/10.1007/978-3-642-21031-0_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21030-3
Online ISBN: 978-3-642-21031-0
eBook Packages: Computer ScienceComputer Science (R0)