Abstract
Only recently, high performance smart card implementations of public key algorithms have reached the market, opening a new field of applications for such systems. We will survey the mathematical techniques behind this development, compare digital signature schemes in view of smart card implementations, discuss security management issues of smart card production, and present three applications to demonstrate the use of smart cards for security purposes.
This author's research supported by EPSRC Case Award No. 93315080 and Zergo Ltd.
This author's research supported by a Lloyd's of London Tercentenary Foundation Research Fellowship.
Preview
Unable to display preview. Download preview PDF.
References
E.F.Brickell, A fast modular multiplication algorithm with application to two key cryptography, Proc. of Crypto'82, pp. 51–60, 1982.
J.Burns and C.J.Mitchell, Parameter Selection for Server-Aided RSA Computation Schemes, IEEE Trans. on Computers, Vol. 43, pp. 163–174, 1994.
D.deWaleffe and J.-J.Quisquater, CORSAIR: A Smart Card for Public Key Crytposystems, Proc. of Crypto'90, Springer LNCS 537, pp. 502–513, 1991.
W.Diffie and M. E.Hellman, New directions in cryptography, IEEE Trans. Inform. Theory, IT-22, pp. 644–654, 1976.
T.ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Inform. Theory, IT-31, pp. 469–472, 1985.
A.Fiat and A.Shamir, How to prove yourself: Practical solutions to identification and signature problems, Proc. of Crypto'86, Springer LNCS 263, pp. 186–194, 1987.
FIPS PUB XX, February 1, 1993, Digital Signature Standard, 1993.
M.Gasser and E.McDermott, An Architecture for Practical Delegation in a Distributed System, Proceedings of the IEEE Symposium on Security and Privacy, Oakland, pp. 20–30, 1990.
L.C.Guillou and J.-J.Quisquater, A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory, Proc. of Eurocrypt'88, Springer LNCS 330, pp. 123–128, 1988.
L.C.Guillou, M.Ugon and J.-J.Quisquater, The Smart Card: A Standardized Security Device Dedicated to Public Cryptography, in G.J.Simmons, editor, Contemporary Cryptology, IEEE Press, 1991.
J.Hashkes and M.Cohen, Managing Smart Cards for Pay Television, The Video-Crypt Approach, Seminar on Conditional Access for Audiovisual Services, Rennes, France, 12–14 June 1990 (ACSA '90).
Hitachi Europe Ltd., em IC Card Devices — Towards 2000, presented at Smart Card 95, London, 1995.
ISO 7816-1:1987 Identification cards — Integrated circuit(s) with contacts — Part 1: Physical characteristics, Geneva: International Organization for Standardization, 1987.
ISO 7816-2:1988 Identification cards — Integrated circuit(s) cards with contacts — Part 2: Dimensions and location of the contacts Geneva: International Organization for Standardization, 1988.
ISO/IEC 7816-3:1989 Identification cards — Integrated circuit(s) cards with contacts — Part 3: Electronic signals and transmission protocols, Geneva: International Organization for Standardization, 1989.
ISO/IEC Draft International Standard 13818-1, Information technology — Generic coding of moving pictures and associated audio information — Systems, Geneva: International Organization for Standardization.
J.Jedwab and C.J.Mitchell, Minimum weight modified signed-digit representations and fast exponentiation, Electronics Letters, Vol. 25, pp. 11171–2, 1989.
H.-J.Knobloch, A Smart Card Implementation of the Fiat-Shamir Identification Scheme, Proc. of Eurocrypt'88, Springer LNCS 330, pp. 87–95, 1988.
M.Kuhn, Details.txt, ftp://cip.informatik.uni-erlangen.de/VideoCrypt/cardadapter.
C.-S.Laih, S.-M.Yen and L.Harn, Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence, Proc. of Asiacrypt'91, Springer LNCS 739, pp. 450–459, 1992.
B.A.LaMacchia and A.M.Odlyzko, Computation of Discrete Logarithms in Prime Fields, Designs, Codes and Cryptography, Vol. 1, No.1, pp. 47–62, 1991.
T.Matsumoto, K.Kato and H.Imai, Speeding up Secret Computations with insecure Auxiliary Devices, Proc. of Crypto'88, Springer LNCS 403, pp. 497–506, 1990.
P.L.Montgomery, Modular Multiplication Without Trial Division, Mathematics of Computation, Vol. 44, pp. 519–521, 1985.
G.Morgan, Smart Cards for Subscription Television: VideoCrypt — a Secure Solution, Proc. Smart Card '91, Agestream Ltd., Peterborough, UK, 1991.
D.Naccache, D.Raihi, D.Raphaeli and S.Vaudenay, Can D.S.A. be Improved?-Complexity Trade-Offs with the Digital Signature Standard, Proc. of Eurocrypt'94, Springer LNCS 950, pp. 77–85, 1995.
D.Naccache, Arithmetic Co-processors: The State of the Art, preprint, 1995.
M.J.Norris and G.J.Simmons, Algorithms for high-speed modular arithmetics, Congressus Numerantium, Vol. 31, pp. 151–163, 1981.
A.M.Odlyzko, Talk given at Hewlett-Packard Symposium on Information Security, Royal Holloway, University of London, 19 December, 1994.
P.Peyret, G.Lisimaque and T.Y.Chua, Smart Cards Provide Very High Security and Flexibility in Subscribers Management, IEEE Transactions on Consumer Electronics, Vol. 36, No.3, pp. 744–752, 1990.
B.Pfitzmann and M.Waidner, Attacks on Protocols for Server-Aided RSA Computation Protocols, Proc. of Eurocrypt'92, Springer LNCS 658, pp. 153–162, 1993.
K.C.Posch and R.Posch, Modulo Reduction in Residue Number Systems, IEEE Transactions on Parallel and Distributed Systems, Vol. 6, pp. 449–454, 1995.
J.-J.Quisquater and M.DeSoete, Speeding up smart card RSA computations with insecure coprocessors, D.Chaum, ed., Proc. of Smart Card 2000, Elsevier Science, Amsterdam, pp. 191–197, 1991.
G.W. Reitwieser, Binary Arithmetics, in Advances in Computers, F.L.Alt (ed), Vol.1, pp. 231–308, 1960.
R. L.Rivest and A.Shamir and L.Adleman, A method for btaining digital signatures and public key cryptosystems, Commun. ACM, ol. 21, pp. 120–126, 1978.
C.P.Schnorr, Efficient Identification and Signatures for Smart Cards, Proc. of Crypto'89, Springer LNCS 435, pp. 239–252, 1990.
H.Sedlak, The RSA cryptography processor, Proc. of Eurocrypt'87, Springer LNCS 304, pp. 95–105, 1987.
Siemens, ICs for Chip Cards-SLE44C200, Data Sheet 09.94, 1994.
A.Shimbo and S.Kawamura, Factorisation Attack on Certain Server-Aided Computation Protocols for the RSA Secret Transformation, Electronics Letters, Vol. 26, pp. 1387–1388, 1990.
A.Turbat, Introductory Remarks, Proc. of Eurocrypt'84, Springer LNCS 209, pp. 457–458, 1985.
N.Takagi and S.Yajima, Modular Multiplication Hardware Algorithms with a Redundant Representation and Their Application to the RSA Cryptosystem, IEEE Trans, on Computers, C-41, pp. 887–891, 1992.
Visa, Chip Cards: More power to the Cardholder, October 1994.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1996 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fuchsberger, A., Gollmann, D., Lothian, P., Paterson, K.G., Sidiropoulos, A. (1996). Public-key cryptography on smart cards. In: Dawson, E., Golić, J. (eds) Cryptography: Policy and Algorithms. CPA 1995. Lecture Notes in Computer Science, vol 1029. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0032364
Download citation
DOI: https://doi.org/10.1007/BFb0032364
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-60759-5
Online ISBN: 978-3-540-49363-1
eBook Packages: Springer Book Archive