Implementation of a Provably Secure, Smartcard-based Key Distribution Protocol
dc.contributor.author | Jerdonek, Rob | en_US |
dc.contributor.author | Honeyman, Peter | en_US |
dc.contributor.author | Coffman, Kevin | en_US |
dc.contributor.author | Rees, Jim | en_US |
dc.contributor.author | Wheeler, Kip | en_US |
dc.date.accessioned | 2014-07-18T18:11:57Z | |
dc.date.available | 2014-07-18T18:11:57Z | |
dc.date.issued | 1998-06-24 | en_US |
dc.identifier.citation | R. Jerdonek, P. Honeyman, K. W. Coffman, J. Rees, and K. Wheeler, "Implementation of a Provably Secure, Smartcard-based Key Distribution Protocol," June 1998. [CARDIS, Louvaine-la-Neuve, Belgium (September 1998).] <http://hdl.handle.net/2027.42/107920> | en_US |
dc.identifier.uri | https://hdl.handle.net/2027.42/107920 | |
dc.description.abstract | We describe the implementation of the Shoup-Rubin key distribution protocol. This protocol stores long-term keys on a smartcard and uses the cryptographic capability of the card to generate and distribute session keys securely. The designers of the protocol provide a mathematical proof of its security, using techniques pioneered by Bellare and Rogaway. Combining this theoretical strength with our implementation on tamper resistant hardware results in practical and powerful middleware functionality, useful in applications that demand strong authentication and confidentiality. | en_US |
dc.publisher | Center for Information Technology Integration | en_US |
dc.title | Implementation of a Provably Secure, Smartcard-based Key Distribution Protocol | en_US |
dc.type | Technical Report | en_US |
dc.subject.hlbsecondlevel | Computer Science | en_US |
dc.subject.hlbtoplevel | Engineering | en_US |
dc.contributor.affiliationum | Center for Information Technology Integration | en_US |
dc.contributor.affiliationother | Personal Cipher Card Corporation [5th listed author] | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/107920/1/citi-tr-98-4.pdf | |
dc.owningcollname | Electrical Engineering and Computer Science, Department of (EECS) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.