DocumentCode
2829095
Title
Software smart cards via cryptographic camouflage
Author
Hoover, D.N. ; Kausik, B.N.
Author_Institution
Arcot Syst. Inc., USA
fYear
1999
fDate
1999
Firstpage
208
Lastpage
215
Abstract
A sensitive point in public key cryptography is how to protect the private key. We outline a method of protecting private keys using cryptographic camouflage. Specifically, we do not encrypt the private key with a password that is too long for exhaustive attack. Instead, we encrypt it so that only one password will decrypt it correctly, but many passwords will decrypt it to produce a key that looks valid enough to fool an attacker. For certain applications, this method protects a private key against dictionary attack, as a smart card does, but entirely in software
Keywords
authorisation; public key cryptography; smart cards; cryptographic camouflage; dictionary attack; password; private keys; public key cryptography; software smart cards; Argon; Art; Authentication; Containers; Cryptographic protocols; Dictionaries; Protection; Public key cryptography; Smart cards; World Wide Web;
fLanguage
English
Publisher
ieee
Conference_Titel
Security and Privacy, 1999. Proceedings of the 1999 IEEE Symposium on
Conference_Location
Oakland, CA
ISSN
1081-6011
Print_ISBN
0-7695-0176-1
Type
conf
DOI
10.1109/SECPRI.1999.766915
Filename
766915
Link To Document