Subject: [ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]
arxiv: Computer Science::Cryptography and Security | Computer Science::Operating Systems
International audience; We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicable to security proofs in both symbolic and computational models of crypt... View more
 International Organization for Standardization, “ISO 9564-1: Banking personal identification number (PIN) management and security,” 30 pages.
 C. Cachin and J. Camenisch, “Encrypting keys securely,” IEEE Security & Privacy, vol. 8, no. 4, pp. 66-69, 2010.
 R. Anderson, “The correctness of crypto transaction sets,” in Proc. 8th International Workshop on Security Protocols, ser. Lecture Notes in Computer Science, vol. 2133. Springer, 2000, pp. 125-127.
 M. Bond, “Attacks on cryptoprocessor transaction sets,” in Proc. 3rd International Workshop on Cryptographic Hardware and Embedded Systems (CHES'01), ser. Lecture Notes in Computer Science, vol. 2162. Springer, 2001, pp. 220-234.
 R. Clayton and M. Bond, “Experience using a lowcost FPGA design to crack DES keys,” in Proc. 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES'02), ser. Lecture Notes in Computer Science, vol. 2523. Springer, 2003, pp. 579- 592.
 J. Clulow, “The design and analysis of cryptographic APIs for security devices,” Master's thesis, University of Natal, Durban, 2003.
 M. Bortolozzo, M. Centenaro, R. Focardi, and G. Steel, “Attacking and fixing PKCS#11 security tokens,” in Proc. 17th ACM Conference on Computer and Communications Security (CCS'10). ACM Press, 2010, pp. 260-269.
 V. Cortier and G. Steel, “A generic security API for symmetric key management on cryptographic devices,” in Proc. 14th European Symposium on Research in Computer Security (ESORICS'09), ser. Lecture Notes in Computer Science, vol. 5789. Springer, 2009, pp. 605- 620.
 C. Cachin and N. Chandran, “A secure cryptographic token interface,” in Proc. 22th IEEE Computer Security Foundation Symposium (CSF'09). IEEE Computer Society Press, 2009, pp. 141-153.
 J. Clulow, “On the security of PKCS#11,” in Proc. 5th International Workshop on Cryptographic Hardware and Embedded Systems (CHES'03), ser. Lecture Notes in Computer Science, vol. 2779. Springer, 2003, pp. 411- 425.