Skip to main content

Networked cryptographic devices resilient to capture

Publication ,  Conference
MacKenzie, P; Reiter, MK
Published in: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
January 1, 2001

We present a simple technique by which a device that performs private key operations (signatures or decryptions) in networked applications, and whose local private key is activated with a password or PIN, can be immunized to offline dictionary attacks in case the device is captured. Our techniques do not assume tamper resistance of the device, but rather exploit the networked nature of the device, in that the device's private key operations are performed using a simple interaction with a remote server. This server, however, is untrusted-its compromise does not reduce the security of the device's private key unless the device is also captured-and need not have a prior relationship with the device. We further extend this approach with support for key disabling, by which the rightful owner of a stolen device can disable the device's private key even if the attacker already knows the user's password.

Duke Scholars

Published In

Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy

ISSN

1063-7109

Publication Date

January 1, 2001

Start / End Page

12 / 25
 

Citation

APA
Chicago
ICMJE
MLA
NLM
MacKenzie, P., & Reiter, M. K. (2001). Networked cryptographic devices resilient to capture. In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy (pp. 12–25).
MacKenzie, P., and M. K. Reiter. “Networked cryptographic devices resilient to capture.” In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, 12–25, 2001.
MacKenzie P, Reiter MK. Networked cryptographic devices resilient to capture. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. 2001. p. 12–25.
MacKenzie, P., and M. K. Reiter. “Networked cryptographic devices resilient to capture.” Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, 2001, pp. 12–25.
MacKenzie P, Reiter MK. Networked cryptographic devices resilient to capture. Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. 2001. p. 12–25.

Published In

Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy

ISSN

1063-7109

Publication Date

January 1, 2001

Start / End Page

12 / 25