期刊文献+

智能卡的安全威胁模型 被引量:4

Security Threat Model for Smart Cards
在线阅读 下载PDF
导出
摘要 智能卡系统与传统的计算机系统不同,它不仅仅受制于单一的信任周界。本文介绍了智能卡的可信任环境模型,讨论了智能卡系统中的不同分支的安全性,并针对智能卡的威胁模型提出了相应的抵抗模型。 Smart card systems differ from conventional computer systems in that different aspects of the system are not under a single trust boundary . We discuss the security ramifications of these 'splits' in trust,and outline a pair of fundamental defenses for cards, that operate at the system design level ,offering system designers a new model in which to evaluate their systems.
出处 《通信保密》 2000年第1期24-28,共5页
关键词 智能卡 威胁模型 安全周界 smart card, threat model, security boundary, attack, transparency
  • 相关文献

参考文献6

  • 1[1]Schneier B. Cryptographic designs vulnerabilities. IEEE Computer, September 1998;31(9):29~33
  • 2[2]Rowley T. How to break a smart card. In: The 1997 RSA Data Security Conference Proceedings,RSA Data Security, Inc, 1997
  • 3[3]Anderson R, Kuhn M. Tamper resistance-a cautionary note. In:Second USENIX Workshop on Electronic Commerce Proceedings, 1996:1~11
  • 4[4]Biham E, Shamir A. Differential fault analysis of secret key cryptosystems. In: Crypto’97 Proceedings, Springer-Verlag, 1997:513~525
  • 5[5]Kocher P. Timing attacks on implementations of Diffe-Hellman, RSA, DSS, and other systems. In: Crypto’96 Proceedings, Springer-Verlag, 1996:104~113
  • 6[6]Simmons G J. Subliminal channels: past and present. European Transactions on Telecommunications, 1994;4(4):459~473

同被引文献7

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部