SDW 2016 | Living with untrusted software | Dr David Everett

Modern Identity and Authentication protocols make implicit assumptions on the underlying software platforms.

Even worse you cannot in practice trust the hardware of a computing device, smart cards included.

It goes without saying that the software has to trust the correctness of the hardware on which it runs. This paper will examine the security model for an authentication protocol using an eID card and the security requirements for the core components. Then the 64 thousand dollar question, what is the probability the requirements can be met?

© 2018 Microexpert. Registered number 01755695.
line-height: 180%;