JCAlgTest: Robust identification metadata for certified smartcards

Varování

Publikace nespadá pod Pedagogickou fakultu, ale pod Fakultu informatiky. Oficiální stránka publikace je na webu muni.cz.
Autoři

ŠVENDA Petr KVAŠŇOVSKÝ Rudolf NAGY Imrich DUFKA Antonín

Rok publikování 2022
Druh Článek ve sborníku
Konference Proceedings of the 19th International Conference on Security and Cryptography (SECRYPT 2022)
Fakulta / Pracoviště MU

Fakulta informatiky

Citace
www Odkaz na autorský preprint
Doi http://dx.doi.org/10.5220/0011294000003283
Klíčová slova smartcards javacard performance cryptography
Popis The certification of cryptographic smartcards under the Common Criteria or NIST FIPS140-2 is a well-established process, during which an evaluation facility validates the manufacturer's claims and issues a product certificate. The tested card is usually identified by its name, type, ATR, and Card Production Life Cycle (CPLC) data. While sufficient to pair the purchased card to its original certificate when bought from a trustworthy seller, such static metadata stored on the card can easily be manipulated. We extend the currently used card identification with a more descriptive set of metadata extracted from supported functionality, performance profiling, and properties of generated cryptographic keys. All of this information can be obtained directly by the evaluation facility, appended to the certificate, and later verified by the end-user with no need for any special knowledge or equipment, resulting in a better assurance about the purchased product. We developed a suite of open tools for the extraction of such characteristics and collected results for a set of more than 100 different smartcards. The database, openly available, demonstrates the significant variability in the measured properties and allows us to estimate the trends in support of different cryptographic algorithms as provided by the JavaCard platform.
Související projekty:

Používáte starou verzi internetového prohlížeče. Doporučujeme aktualizovat Váš prohlížeč na nejnovější verzi.