scispace - formally typeset
Open AccessBook ChapterDOI

The smart diskette: a universal user token and personal crypto-engine

Paul Barrett, +1 more
- pp 74-79
Reads0
Chats0
TLDR
It is becoming increasingly common for large, distributed systems to utilise personal computers for the purpose of user access, and hence the security arrangements for such an access point have become a focus of attention in systems security design.
Abstract
It is becoming increasingly common for large, distributed systems to utilise personal computers (PC’s) for the purpose of user access, and hence the security arrangements for such an access point have become a focus of attention in systems security design. Generally speaking the functional requirements of a PC security sub-system are as follows:- (i) Identity verification of the user, for controlling access both to resources within the local PC workstation and to remote teleprocessing services on other machines. (ii) File encryption at the PC for secure storage. (iii) Message encryption and message authentication for secure communications. (iv) Digital signatures for proof of origin of communications and for data and software certification.

read more

Content maybe subject to copyright    Report

Citations
More filters
Book ChapterDOI

Attacks on protocols for server-aided RSA computation

TL;DR: It is shown that the main attacks show that much smaller search spaces suffice and that the attack may still work if the smart card checks the correctness of the result; this was previously believed to be can easy measure excluding all active attacks.
Book ChapterDOI

Attacks on the HKM/HFX Cryptosystem

TL;DR: The HKM / HFX cryptosystem is proposed for standardization at the ITU Telecommunication Standardization Sector Study Group 8 and is designed to provide authenticity and confidentiality of FAX messages at a commercial level of security.
Patent

Method for authenticating a data processing system from a computer diskette

TL;DR: In this paper, the authors proposed a method for authenticating a first data processing system by a second data processing systems, in which the first system sends the second system an identity code, and the second checks this identity and, in the event of agreement, sends a first random number to the first systems; the signature algorithm defined by a key and sends this first signed random number.
Patent

A method of authenticating a data set from a computer disk.

TL;DR: The invention relates to a method for authenticating a first computer with a second computer arrangement, in which the first set sends to the second set an identity code and the second unit applies a second signature verification algorithm.
References
More filters
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Book ChapterDOI

Physical protection of cryptographic devices

TL;DR: The need to protect critical cryptographic variables (particularly keys, and in some cases algorithms) in a secure environment within cryptographic equipment, particularly those used in the area of high value funds transfer transactions is explained.
Proceedings ArticleDOI

Polonium: An Identity Authentication System

TL;DR: A system which offers an innovative solution to the problem of establishing identities over insecure communications channels through the possession of a personal authentication device and knowledge of a unique PIN number.
Book ChapterDOI

The Application of Smart Cards for RSA Digital Signatures in a Network Comprising both Interactive and Store-and-Foreward Facilities

TL;DR: The requirements for user authentication and digital signature in complex networks and the problems of integrating a smart-card sub-system are examined and some design approaches for providing a useful lifetime for a smart card and for handling the computations required for 512-bit RSA digital signatures are proposed.