首页> 外文会议>IEEE Computer Security Foundations Symposium >How to Wrap it up - A Formally Verified Proposal for the use of Authenticated Wrapping in PKCS#11
【24h】

How to Wrap it up - A Formally Verified Proposal for the use of Authenticated Wrapping in PKCS#11

机译:如何将其括起来 - 以PKCS#11使用经过身份验证包装的正式验证的提案

获取原文

摘要

Being the most widely used and comprehensive standard for hardware security modules, cryptographic tokens and smart cards, PKCS#11 has been the subject of academic study for years. PKCS#11 provides a key store that is separate from the application, so that, ideally, an application never sees a key in the clear. Again and again, researchers have pointed out the need for an import/export mechanism that ensures the integrity of the permissions associated to a key. With version 2.40, for the first time, the standard included authenticated deterministic encryption schemes. The interface to this operation is insecure, however, so that an application can get the key in the clear, subverting the purpose of using a hardware security module. This work proposes a formal model for the secure use of authenticated deterministic encryption in PKCS#11, including concrete API changes to allow for secure policies to be implemented. Owing to the authenticated encryption mechanism, the policy we propose provides more functionality than any policy proposed so far and can be implemented without access to a random number generator. Our results cover modes of operation that rely on unique initialisation vectors (IVs), like GCM or CCM, but also modes that generate synthetic IVs. We furthermore provide a proof for the deduction soundness of our modelling of deterministic encryption in B?hl et.al.'s composable deduction soundness framework.
机译:作为硬件安全模块,加密令牌和智能卡的最广泛使用和全面的标准,PKCS#11是多年学术研究的主题。 PKCS#11提供与应用程序分开的密钥商店,因此,理想情况下,应用程序永远不会在清除中看到一个密钥。研究人员再次指出,需要一种导入/导出机制,可确保与密钥相关的权限的完整性。使用2.40版,第一次标准包括经过身份验证的确定性加密方案。然而,该操作的接口是不安全的,因此应用程序可以在清除中获取密钥,然后颠覆使用硬件安全模块的目的。这项工作提出了一个正式模型,用于在PKCS#11中安全使用经过身份验证的确定性加密,包括具体API更改,以允许实现安全的策略。由于经过身份验证的加密机制,我们提出的策略提供了比到目前为止所提出的任何策略的更多功能,并且可以在没有访问随机数生成器的情况下实现。我们的结果涵盖了依赖唯一初始化向量(IVS)的操作模式,如GCM或CCM,也可以产生合成IVS的模式。我们还提供了我们在B?HL et.Al中的确定性加密建模的扣除声音的证据。合作扣除合作框架。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号