Abstract
It is becoming increasingly common for large, distributed systems to utilise personal computers (PC’s) for the purpose of user access, and hence the security arrangements for such an access point have become a focus of attention in systems security design. Generally speaking the functional requirements of a PC security sub-system are as follows:-
-
(i)
Identity verification of the user, for controlling access both to resources within the local PC workstation and to remote teleprocessing services on other machines.
-
(ii)
File encryption at the PC for secure storage.
-
(iii)
Message encryption and message authentication for secure communications.
-
(iv)
Digital signatures for proof of origin of communications and for data and software certification.
Download to read the full chapter text
Chapter PDF
References
Sherwood J. R. and Gallo V. A., “The application of smart cards for RSA digital signatures in a network comprising both interactive and store-and-forward facilities”, Proc. of Crypto 88, Springer-Verlag, 1988.
Wong R., Berson T. and Feiertag R., “Polonius: An identity authentication system”, Proc. of IEEE symposium on secrecy and privacy, 1985.
Eisele R., “Host access security”, presented at Interact 86, Orlando, Florida, 1986.
Sherwood J. R., “Digital signature schemes using smart cards”, Proc. of Smart Card 88, London, 1988.
Rivest R., Shamir A. and Adleman L., “A method of obtaining digital signatures and public key cryptosystems”, Comm. of ACM, Vol 21, No.2 Feb 1978.
Barrett P. D., “Implementing the RSA public key encryption scheme on a digital signal processor”, Proc. of Crypto 86, Springer-Verlag, 1986.
Clark A. J., “Physical protection of cryptographic devices”, Eurocrypt 87, Amsterdam, 1987.
Chorley, G.J., & Price W.L. “An intelligent token for secure transactions”, Pro IFIP/Sec’ 86, Monte Carlo December 1986 pp 442–450.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1990 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Barrett, P., Eisele, R. (1990). The Smart Diskette A Universal User Token and Personal Crypto-Engine. In: Brassard, G. (eds) Advances in Cryptology — CRYPTO’ 89 Proceedings. CRYPTO 1989. Lecture Notes in Computer Science, vol 435. Springer, New York, NY. https://doi.org/10.1007/0-387-34805-0_8
Download citation
DOI: https://doi.org/10.1007/0-387-34805-0_8
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-97317-3
Online ISBN: 978-0-387-34805-6
eBook Packages: Springer Book Archive