Implementation of a Provably Secure, Smartcard-based Key Distribution Protocol
dc.contributor.author | Jerdonek, Rob | en_US |
dc.contributor.author | Honeyman, Peter | en_US |
dc.contributor.author | Coffman, Kevin | en_US |
dc.contributor.author | Rees, Jim | en_US |
dc.contributor.author | Wheeler, Kip | en_US |
dc.date.accessioned | 2014-07-18T18:11:57Z | |
dc.date.available | 2014-07-18T18:11:57Z | |
dc.date.issued | 1998-06-24 | en_US |
dc.identifier.citation | R. Jerdonek, P. Honeyman, K. W. Coffman, J. Rees, and K. Wheeler, "Implementation of a Provably Secure, Smartcard-based Key Distribution Protocol," June 1998. [CARDIS, Louvaine-la-Neuve, Belgium (September 1998).] <http://hdl.handle.net/2027.42/107920> | en_US |
dc.identifier.uri | https://hdl.handle.net/2027.42/107920 | |
dc.description.abstract | We describe the implementation of the Shoup-Rubin key distribution protocol. This protocol stores long-term keys on a smartcard and uses the cryptographic capability of the card to generate and distribute session keys securely. The designers of the protocol provide a mathematical proof of its security, using techniques pioneered by Bellare and Rogaway. Combining this theoretical strength with our implementation on tamper resistant hardware results in practical and powerful middleware functionality, useful in applications that demand strong authentication and confidentiality. | en_US |
dc.publisher | Center for Information Technology Integration | en_US |
dc.title | Implementation of a Provably Secure, Smartcard-based Key Distribution Protocol | en_US |
dc.type | Technical Report | en_US |
dc.subject.hlbsecondlevel | Computer Science | en_US |
dc.subject.hlbtoplevel | Engineering | en_US |
dc.contributor.affiliationum | Center for Information Technology Integration | en_US |
dc.contributor.affiliationother | Personal Cipher Card Corporation [5th listed author] | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/107920/1/citi-tr-98-4.pdf | |
dc.owningcollname | Electrical Engineering and Computer Science, Department of (EECS) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe its collections in a way that respects the people and communities who create, use, and are represented in them. We encourage you to Contact Us anonymously if you encounter harmful or problematic language in catalog records or finding aids. More information about our policies and practices is available at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.