A new security proof of practical cryptographic devices based on hardware, software and protocols

An Wang*, Zheng Li, Xianwen Yang, Yanyan Yu

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Nowadays, cryptographic devices are widely used, so how to assess the security of them becomes a pivotal issue. There are two conventional ways to do this, by analyzing the underlying cryptographic protocols or by estimating if the devices meet standards such as FIPS 140-2 or Common Criteria Standard Documents. However, neither of them provides a comprehensive view of the security of the devices. In this paper, we first propose a bottom-up method to prove the UC (Universally Composable) security of the cryptographic devices composed by hardware, software and protocols, and give a general security framework of them. Base on the framework, we present a method that describes the local physical security of cryptographic SoC hardware as UC security. Then we establish the equivalence of software codes and the real-world models in the condition of "Exactly Realize", which illustrate the UC security of software. Besides, we propose methods to construct UC secure cryptographic modules from UC secure cryptographic SoC and a further method to construct UC secure cryptographic devices. Furthermore, based on the idea of bottom-up, we can develop new UC secure cryptographic devices which are more powerful by the combination of the existed UC secure cryptographic devices.

Original languageEnglish
Title of host publicationInformation Security Practice and Experience - 7th International Conference, ISPEC 2011, Proceedings
Pages386-400
Number of pages15
DOIs
Publication statusPublished - 2011
Externally publishedYes
Event7th International Conference on Information Security Practice and Experience, ISPEC 2011 - Guangzhou, China
Duration: 30 May 20111 Jun 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6672 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference7th International Conference on Information Security Practice and Experience, ISPEC 2011
Country/TerritoryChina
CityGuangzhou
Period30/05/111/06/11

Keywords

  • Cryptographic device
  • bottom-up method
  • cryptographic SoC
  • universally composable security model

Fingerprint

Dive into the research topics of 'A new security proof of practical cryptographic devices based on hardware, software and protocols'. Together they form a unique fingerprint.

Cite this