Applying Protocol Analysis to Security Device Interfaces

IEEE Security & Privacy(2006)

引用 21|浏览0
暂无评分
摘要
Despite best efforts, general-purpose computing platforms and servers continue to be insecure. Due totheir complexity, furthermore, it seems unlikely that a completely secure system can be built in the foreseeable future. Fortunately, a promising alternative exists: the use of trusted cryptographic devicesand subsystems. Like smart cards, such devices hold and use secret cryptographic keys on behalf of a largergeneral-purpose system. Yet these devices are more than simply cryptographic coprocessors--they areresponsible for the secrecy of their keys and will withhold them from even the system itself. If the deviceis also tamper-resistant (which is common), its keys will (hopefully) be used only in ways the device permits.
更多
查看译文
关键词
cryptographic devicesand subsystems,secure system,cryptographic coprocessors,general-purpose computing platform,protocol analysis,best effort,device permit,secret cryptographic key,security device interfaces,foreseeable future,due totheir complexity,largergeneral-purpose system,protocols,smart card,cryptographic key,distributed system,security,cryptography,security analysis
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要