Living with untrusted software | Dr David Everett | SDW 2016

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
 

Modern Identity and Authentication protocols make implicit assumptions on the underlying software platforms. Even worse you cannot in practice trust the hardware of a computing device, smart cards included. It goes without saying that the software has to trust the correctness of the hardware on which it runs. This paper will examine the security model for an authentication protocol using an eID card and the security requirements for the core components. Then the 64 thousand dollar question, what is the probability the requirements can be met?

CONTACT US

  +44 (0) 1903 721 668
  info@microexpert.com

  Microexpert Limited
Gratwicke House
10 East Street
Littlehampton
West Sussex
BN17 6AW, UK
© 2017 Microexpert. Registered number 01755695.

Search