Providing authentication to messages signed with a smart card in hostile environments

  • Authors:
  • Tage Stabell-Kulø;Ronny Arild;Per Harald Myrvang

  • Affiliations:
  • Department of Computer Science, University of Tromsø, Tromsø, Norway;Department of Computer Science, University of Tromsø, Tromsø, Norway;Department of Computer Science, University of Tromsø, Tromsø, Norway

  • Venue:
  • WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
  • Year:
  • 1999

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper presents a solution to how a smart card can be used to sign data in a hostile environment. In particular, how to use a smart card to make a signature on data when the machine to which the smart-card reader is attached can not be trusted. The problem is solved by means of a verification server together with a substitution table and a one-time pad; it is argued that lacking a trusted channel from the card, our solution is minimal. An invalid signature (a signature on data not intended to be signed) can only be made if the online server colludes with the machine the user is using. In all other circumstances, only a denial-of-service attack is possible. The realization is applicable in practice, but slightly awkward.