2012
DOI: 10.1007/978-3-642-28641-4_19
|View full text |Cite
|
Sign up to set email alerts
|

Type-Based Analysis of PKCS#11 Key Management

Abstract: Abstract. PKCS#11, is a security API for cryptographic tokens. It is known to be vulnerable to attacks which can directly extract, as cleartext, the value of sensitive keys. In particular, the API does not impose any limitation on the different roles a key can assume, and it permits to perform conflicting operations such as asking the token to wrap a key with another one and then to decrypt it. Fixes proposed in the literature, or implemented in real devices, impose policies restricting key roles and token fun… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
2
1
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…In [6] the authors propose a simple language, for the coding of PKCS#11 APIs, and they develop a type-based analysis to prove that the secrecy of sensitive keys is preserved under a certain policy. This solution, is however limited to PKCS#11 cryptographic APIs and to symmetric keys, whereas in this paper we propose a new language that is applicable to general cryptographic APIs, that is, any key storage that is managed through handles, and that manages also asymmetric and signing keys, in the style of [16].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [6] the authors propose a simple language, for the coding of PKCS#11 APIs, and they develop a type-based analysis to prove that the secrecy of sensitive keys is preserved under a certain policy. This solution, is however limited to PKCS#11 cryptographic APIs and to symmetric keys, whereas in this paper we propose a new language that is applicable to general cryptographic APIs, that is, any key storage that is managed through handles, and that manages also asymmetric and signing keys, in the style of [16].…”
Section: Related Workmentioning
confidence: 99%
“…We then formalize the attacker model and define API security. The API language is inspired in [6] but here we allow more expressive types that dictate how keys should be used and what is their security level. Moreover we consider asymmetric encryption and digital signatures that are not accounted for in [6].…”
Section: A Language For Key Management Apismentioning
confidence: 99%