Smart cards in hostile environments

  • Authors:
  • Howard Gobioff;Sean Smith;J. D. Tygar;Bennet Yee

  • Affiliations:
  • Carnegie Mellon Univ., Pittsburgh, PA;IBM Research, Yorktown Heights, NY;Carnegie Mellon Univ., Pittsburgh, PA;UC San Diego, La Jolla, CA

  • Venue:
  • WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
  • Year:
  • 1996

Quantified Score

Hi-index 0.00

Visualization

Abstract

One often hears the claim that smart cards are the solution to a number of security problems, including those arising in point-of-sale systems. In this paper, we characterize the minimal properties necessary for the secure smart card point-of-sale transactions. Many proposed systems fail to provide these properties: problems arise from failures to provide secure communication channels between the user and the smart card while operating in a potentially hostile environment (such as a point-of-sale application.) Moreover, we discuss several types of modifications that can be made to give smart cards additional input/output capacity with a user, and describe how this additional I/O can address the hostile environment problem. We give a notation for describing the effectiveness of smart cards under various environmental assumptions. We discuss several security equivalences among different scenarios for smart cards in hostile environments. Using our notation, these equivalences include: • private input a private output • trusted input + one-bit trusted output a trusted output + one-bit trusted input • secure input a secure output.