If you guys are interested in more technical details on what I hope to
launch as a successor to the existing generation of PKI cards, the
following is it.

Aren't smart cards good enough?  From a tamper-resistance point-of-view
yes, but from a  provisioning point of view smart cards have a long way to go.
>From the SKS paper:

     "even if you buy a $100 card; it still doesn't enable an on-line issuer
      to verify that keys were actually created in the card!"

Well, that is of course not entirely correct because some vendors deploy
shared secrets and proprietary software to secure provisioning but these
schemes do not support *end-user* provisioning, COTS SW, and smart
cards (or mobile phones) potentially acquired by the user itself.

Due to this and some other limitations, 99.9% of all consumers use
passwords.

"Air-tight provisioning", the basics:
http://webpki.org/papers/keygen2/secure-key-store.pdf
If you take a look at "Dual-use Device IDs", you will find a novel (?) use of 
device certificates.

"Air-tight provisioning", core facility:
http://webpki.org/papers/keygen2/session-key-establishment--security-element-2-server.pdf

Anders Rundgren 

_______________________________________________
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel

Reply via email to