Provably secure chipcard personalization, or, how to fool malicious insiders

  • Authors:
  • Helena Handschuh;David Naccache;Pascal Paillier;Christophe Tymen

  • Affiliations:
  • Gemplus Card International, Cryptography Group, Issy-les-Moulineaux, France;Gemplus Card International, Cryptography Group, Issy-les-Moulineaux, France;Gemplus Card International, Cryptography Group, Issy-les-Moulineaux, France;Gemplus Card International, Cryptography Group, Issy-les-Moulineaux, France and École Normale Supérieure, Paris, France

  • Venue:
  • CARDIS'02 Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference - Volume 5
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present 'malicious insider attacks' on chip-card personalization processes and suggest an improved way to securely generate secret-keys shared between an issuer and the user's smart card. Our procedure which results in a situation where even the card manufacturer producing the card cannot determine the value of the secret-keys that he personalizes into the card, uses public key techniques to provide integrity and privacy of the generated keys with respect to the complete initialisation chain. Our solution, which provides a noninteractive alternative to authenticated key agreement protocols, achieves provable security in the random oracle model under standard complexity assumptions. Our mechanism also features a certain genericity and, when coupled to a cryptosystem with fast encryption like RSA, allows low-cost intrusion-secure secret key generation.