TY - JOUR
T1 - New attacks and security model of the secure flash disk
AU - Wang, An
AU - Li, Zheng
AU - Yang, Xianwen
AU - Yu, Yanyan
PY - 2013/6
Y1 - 2013/6
N2 - Nowadays, the secure flash disk is the most common secure mobile storage device. Two conventional schemes, flash encryption and identity authentication, are used to ensure the security of the information stored in it, but there is no comprehensive security model. We summarize three shortcomings of it: the USB cable is very easy to be monitored; the disk is not applicable to a big group and does not resist the corruption attack.In this paper, a new attack named USB cable monitor attack is proposed and implemented. In order to overcome the existing shortcomings, we give a notion of "secure group flash disk" and its security model. Accordingly, a set of universal cryptographic strategies and a concrete authenticated key exchange protocol are devised, whose security can be proved via the universally composable security model. Based on the strategies, the system architecture of this USB flash disk is designed. An IP core of the USB device controller is implemented and verified on a FPGA, so that the performance superiority can be given. Our experiment shows that our strategies can perfectly solve the problems of USB cable monitor, group application, and resistance to corruption.
AB - Nowadays, the secure flash disk is the most common secure mobile storage device. Two conventional schemes, flash encryption and identity authentication, are used to ensure the security of the information stored in it, but there is no comprehensive security model. We summarize three shortcomings of it: the USB cable is very easy to be monitored; the disk is not applicable to a big group and does not resist the corruption attack.In this paper, a new attack named USB cable monitor attack is proposed and implemented. In order to overcome the existing shortcomings, we give a notion of "secure group flash disk" and its security model. Accordingly, a set of universal cryptographic strategies and a concrete authenticated key exchange protocol are devised, whose security can be proved via the universally composable security model. Based on the strategies, the system architecture of this USB flash disk is designed. An IP core of the USB device controller is implemented and verified on a FPGA, so that the performance superiority can be given. Our experiment shows that our strategies can perfectly solve the problems of USB cable monitor, group application, and resistance to corruption.
KW - Authenticated key exchange protocol
KW - Cryptographic security strategy
KW - Cryptography engineering
KW - Secure flash disk
KW - USB cable monitor attack
UR - http://www.scopus.com/inward/record.url?scp=84892495781&partnerID=8YFLogxK
U2 - 10.1016/j.mcm.2011.07.022
DO - 10.1016/j.mcm.2011.07.022
M3 - Article
AN - SCOPUS:84892495781
SN - 0895-7177
VL - 57
SP - 2605
EP - 2612
JO - Mathematical and Computer Modelling
JF - Mathematical and Computer Modelling
IS - 11-12
ER -