Skip to main content

The design and implementation of a JCA-compliant capture protection infrastructure

Publication ,  Conference
Reiter, MK; Samar, A; Wang, C
Published in: Proceedings of the IEEE Symposium on Reliable Distributed Systems
December 1, 2003

A capture protection server protects a cryptographic key on a device that may be captured by authenticating the user of the device (e.g., by password) before permitting the key to be used. Delegation from one capture protection server to another enables the new server to perform this capture protection function for the device. Delegation, however, opens the system to new vulnerabilities, including difficulties in limiting on-line password-guessing attacks and in disabling a device that has been stolen by an attacker who knows the password. Here we propose a lightweight protocol for coordinating capture protection servers that eliminates these vulnerabilities. We also report on the implementation of our protocol in a JCA-compliant cryptographic service provider, and ramifications of the JCA interfaces for our approach. © 2003 IEEE.

Duke Scholars

Published In

Proceedings of the IEEE Symposium on Reliable Distributed Systems

DOI

ISSN

1060-9857

ISBN

0769519555

Publication Date

December 1, 2003

Start / End Page

339 / 348
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Reiter, M. K., Samar, A., & Wang, C. (2003). The design and implementation of a JCA-compliant capture protection infrastructure. In Proceedings of the IEEE Symposium on Reliable Distributed Systems (pp. 339–348). https://doi.org/10.1109/RELDIS.2003.1238086
Reiter, M. K., A. Samar, and C. Wang. “The design and implementation of a JCA-compliant capture protection infrastructure.” In Proceedings of the IEEE Symposium on Reliable Distributed Systems, 339–48, 2003. https://doi.org/10.1109/RELDIS.2003.1238086.
Reiter MK, Samar A, Wang C. The design and implementation of a JCA-compliant capture protection infrastructure. In: Proceedings of the IEEE Symposium on Reliable Distributed Systems. 2003. p. 339–48.
Reiter, M. K., et al. “The design and implementation of a JCA-compliant capture protection infrastructure.” Proceedings of the IEEE Symposium on Reliable Distributed Systems, 2003, pp. 339–48. Scopus, doi:10.1109/RELDIS.2003.1238086.
Reiter MK, Samar A, Wang C. The design and implementation of a JCA-compliant capture protection infrastructure. Proceedings of the IEEE Symposium on Reliable Distributed Systems. 2003. p. 339–348.

Published In

Proceedings of the IEEE Symposium on Reliable Distributed Systems

DOI

ISSN

1060-9857

ISBN

0769519555

Publication Date

December 1, 2003

Start / End Page

339 / 348