SDW 2016 | Living with untrusted software | Dr David Everett

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Modern Identity and Authentication protocols make implicit assumptions on the underlying software platforms.

Even worse you cannot in practice trust the hardware of a computing device, smart cards included.

It goes without saying that the software has to trust the correctness of the hardware on which it runs. This paper will examine the security model for an authentication protocol using an eID card and the security requirements for the core components. Then the 64 thousand dollar question, what is the probability the requirements can be met?


+44 (0) 1903 723 548

Microexpert Limited
Gratwicke House
10 East Street
West Sussex
BN17 6AW, UK

© 2018 Microexpert. Registered number 01755695.