CrySIL: Bringing Crypto to the Modern User

作者: Florian Reimair , Peter Teufl , Thomas Zefferer

DOI: 10.1007/978-3-319-30996-5_4

关键词:

摘要: Modern times introduced a highly heterogeneous device landscape. The landscape was populated by distributed applications. These applications are used modern multi-device users. A user wants to create, process, and share potentially sensitive data among her devices. For instance, start document at the smart phone, continue on laptop finish tablet. common way protect against disclosure theft is cryptography. Cryptography, however, requires for all devices in question be able perform appropriate operations subsequent cryptographic primitives attacks. Unfortunately, different have capabilities when it comes Some hardware-backed solutions available, some cannot do any cryptography all. In general, hard provide adequate (and equal) methods every of – rather basic well-known schemes or new methodologies that long awaited stand challenges cloud. order tackle above mentioned status bring user, we present CrySIL, Cryptographic Service Interoperability Layer. CrySIL designed as flexible extensible layer between primitive. nutshell, can use local key storage solutions, offers remote crypto provider deployments, features strong authentication constrain access primitives. this work, explain motivation describe its architecture, highlight deployment typical case, reflect achievements shortcomings.

参考文章(23)
Clemens Orthacker, Martin Centner, Minimal-Footprint Middleware to Leverage Qualified Electronic Signatures Lecture Notes in Business Information Processing. pp. 60- 68 ,(2011) , 10.1007/978-3-642-22810-0_5
Mihir Bellare, Alexandra Boldyreva, Adam O’Neill, Deterministic and Efficiently Searchable Encryption Advances in Cryptology - CRYPTO 2007. pp. 535- 552 ,(2007) , 10.1007/978-3-540-74143-5_30
Peter Teufl, Thomas Zefferer, Christof Stromberger, Christoph Hechenblaikner, iOS encryption systems: Deploying iOS devices in security-critical environments international conference on security and cryptography. pp. 170- 182 ,(2013)
B. Kaliski, PKCS #5: Password-Based Cryptography Specification Version 2.0 RFC. ,vol. 2898, pp. 1- 34 ,(2000)
H. Leitold, A. Hollosi, R. Posch, Security architecture of the Austrian citizen card concept 18th Annual Computer Security Applications Conference, 2002. Proceedings.. pp. 391- 400 ,(2002) , 10.1109/CSAC.2002.1176311
Daniel Slamanig, Klaus Stranacher, Bernd Zwattendorfer, User-centric identity as a service-architecture for eIDs with selective attribute disclosure symposium on access control models and technologies. pp. 153- 164 ,(2014) , 10.1145/2613087.2613093
Manuel Egele, David Brumley, Yanick Fratantonio, Christopher Kruegel, An empirical study of cryptographic misuse in android applications computer and communications security. pp. 73- 84 ,(2013) , 10.1145/2508859.2516693
Sean Turner, Secure/Multipurpose Internet Mail Extensions IEEE Internet Computing. ,vol. 14, pp. 82- 86 ,(2010) , 10.1109/MIC.2010.121
Christian Hanser, Daniel Slamanig, Blank digital signatures computer and communications security. ,vol. 2013, pp. 95- 106 ,(2013) , 10.1145/2484313.2484324
Jan Camenisch, Victor Shoup, Practical Verifiable Encryption and Decryption of Discrete Logarithms Advances in Cryptology - CRYPTO 2003. pp. 126- 144 ,(2003) , 10.1007/978-3-540-45146-4_8