Security tokens: [basics, applications, management, infrastructures]
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Höhenkirchen
IT, Verl. für Informationstechnik
2001
|
Schriftenreihe: | IT security & IT management
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | VIII, 243 S. Ill., graph. Darst. |
ISBN: | 3936052026 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV013934907 | ||
003 | DE-604 | ||
005 | 20060503 | ||
007 | t | ||
008 | 011001s2001 gw ad|| |||| 00||| eng d | ||
016 | 7 | |a 963131443 |2 DE-101 | |
020 | |a 3936052026 |9 3-936052-02-6 | ||
035 | |a (OCoLC)76329009 | ||
035 | |a (DE-599)BVBBV013934907 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
044 | |a gw |c DE | ||
049 | |a DE-91 |a DE-12 | ||
084 | |a ST 273 |0 (DE-625)143640: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
100 | 1 | |a Schartner, Peter |e Verfasser |4 aut | |
245 | 1 | 0 | |a Security tokens |b [basics, applications, management, infrastructures] |c Peter Schartner |
264 | 1 | |a Höhenkirchen |b IT, Verl. für Informationstechnik |c 2001 | |
300 | |a VIII, 243 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a IT security & IT management | |
650 | 0 | 7 | |a Überwachungseinrichtung |0 (DE-588)4186655-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugang |0 (DE-588)4191103-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Automatische Identifikation |0 (DE-588)4206098-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Zugang |0 (DE-588)4191103-9 |D s |
689 | 0 | 1 | |a Überwachungseinrichtung |0 (DE-588)4186655-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Zugang |0 (DE-588)4191103-9 |D s |
689 | 1 | 1 | |a Automatische Identifikation |0 (DE-588)4206098-9 |D s |
689 | 1 | |5 DE-604 | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009536234&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-009536234 |
Datensatz im Suchindex
_version_ | 1807321527450861568 |
---|---|
adam_text |
Titel: Security Tokens
Autor: Schartner, Peter
Jahr: 2001
Contents
Abstract.iii
1 Introduction.1
1.1 Motivation.1
1.1.1 Goals of Access Control .1
1.1.2 Properties of conventional mechanical Keys and Locks .3
1.1.3 Properties of electronic Keys and Locks.5
1.2 Problem Definition.5
1.2.1 Anti-Collision- and Separation-Mechanisms.6
1.2.2 Key Management.6
1.2.3 Authentication of Lock and Key.7
1.2.4 Administration and Checking of Access Rights.7
1.2.5 Design and Transmission of System- and Audit-Data.10
1.3 Definitions.10
1.4 Requirements on Applications.11
1.5 Process Flow of RF-Applications .12
2 Components.15
2.1 Network and Background System.15
2.2 Smart Cards.17
2.3 Transponders.19
2.4 Required Functionality.20
2.4.1 Unique Token Identifier .20
2.4.2 Cryptographic Co-Processor.21
2.4.3 Pseudo-Random Number Generator.21
2.4.4 Anti-Collision.23
2.4.5 Hardware Random Number Generator.23
2.4.6 Radio Clock.25
2.5 Resources.25
3 Data Transmission .27
3.1 Introduction.27
3.2 Transmission Rates and Overall Processing Time.29
3.3 Message Formats.30
3.4 Anti-Collision.30
3.4.1 Physical Collision Detection.32
3.4.2 Collision Detection by Use of Encoding.37
3.4.3 Logical Collision Handling.47
3.4.4 Collision Avoidance.60
3.5 Open Points and Perspectives.62
Contents
4 Basic Mechanisms.
4.1 Cryptographic Mechanisms.
4.2 Identification and Authentication. • r
4.2.1 Identification versus Verification . .
4.2.2 Biometrics.
4.2.3 Authentication of Token and Terminal
4.3 Miscellaneous Mechanisms.
4.3.1 Security Classes and Security Zones.
4.3.2 Retry Counter.¦
4.3.3 Secure Storage of Audit Information ,,
5 Key Management.
5.1 Introduction. 73
5.2 KeySets. 75
5.3 Pseudo-Random Numbers. 76
5.3.1 Key Generation with Pseudo-Random Number Generators.76
5.3.2 Generation of Pseudo-Random Numbers of Arbitrary Length . 77
5.4 Quasi-Random Numbers. 79
5.4.1 Properties of Pseudo-Random Numbers. 80
5.4.2 Properties of Random Numbers. 80
5.4.3 Something in between?. 80
5.4.4 Quasi-Random Number Generator . 81
5.5 Key Generation for Symmetric Algorithms. 81
5.5.1 Authentication Keys. 82
5.5.2 Session Keys. 82
5.6 Key Generation for Asymmetric Algorithms. 99
5.6.1 Threats Caused by Common Key Components.101
5.6.2 Modified Prime Number Generation.105
5.6.3 Efficient Prime Number Test.113
5.6.4 Resistance against (p-l)-Factoring Method.122
5.6.5 Signature-Law, -Regulation, and -Directive.130
5.6.6 Family-Keys.133
5.6.7 Key Generation Process.135
6 Automotive Applications. 137
6.1 Problem Definition and Requirements.138
6.2 Process Flow .139
6.3 Keys, Locks, and Doors.140
6.4 Authentication .140
6.4.1 Authentication by Use of PRNG (1) .141
6.4.2 Authentication by Use of PRNG (2) .144
6.4.3 Authentication by Use of a Block-Cipher in CBC Mode.152
6.4.4 Authentication by Use of a Block-Cipher in CFB Mode.159
6.4.5 Analysis of Further Modes of Operation .160
6.5 Key Management.100
6.5.1 Prerequisites.101
6.5.2 Key Management of Backup Keys.165
. . 63
. . . 63
. . . 63
. . . 63
. . . 65
. . . 68
. 69
. . . 69
. 70
. 71
Contents vii
6.5.3 Normal Use Authentication .169
6.5.4 Modifications.170
6.6 Mechanisms of Access Control.170
6.7 Auditing.170
6.8 Additional Applications .170
6.9 Attacks .171
6.9.1 Relay Attack - Immobilizer.171
6.9.2 Relay Attack - Remote Control.171
6.9.3 Attacks on Control Lines.172
6.9.4 Denial-of-Service Attack.172
7 Electronic Access Control. 173
7.1 Problem Definition and Requirements.173
7.2 Process Flow .175
7.2.1 Registration of the User.175
7.2.2 Initialization of the Token.175
7.2.3 Usage of the Token.177
7.2.4 Exit of the User.177
7.2.5 Data Structures.178
7.3 Keys, Locks, and Doors.180
7.4 Authentication .182
7.4.1 Prerequisites.185
7.4.2 Initialization.186
7.4.3 Initialization and Update of the Smart Card.187
7.4.4 Changing of the KeySet in the Background-System.187
7.4.5 Authentication Protocol.187
7.4.6 Extension of the Authentication Protocol.191
7.4.7 Analysis of the Authentication Protocol .191
7.5 Key Management.193
7.5.1 Update of the Authentication Keys.193
7.5.2 Logical Keys, Access Rights and Access Restrictions.194
7.5.3 Physical Keys.195
7.6 Mechanisms of Access Control.196
7.6.1 Checking of Access Rights and Access Restrictions.196
7.6.2 Time Locks and Time Restrictions .197
7.6.3 Mantraps and Separation Mechanisms .198
7.7 Auditing.200
7.7.1 Problem Definition.200
7.7.2 Auditing by Use of Security Tokens.201
7.7.3 Auditing by Use of Audit Zones.204
7.7.4 Log Files.205
7.8 Additional Applications .207
7.9 Attacks .207
7.9.1 Relay Attack .207
7.9.2 Attacks on Control Lines.209
7.9.3 Denial-of-Service Attack.209
viii Contents
8 Conclusions and Perspectives .211
A Program Code Conventions.215
B Abbreviations.217
C Symbols Notation.221
f :',S ,
References.223 |
any_adam_object | 1 |
author | Schartner, Peter |
author_facet | Schartner, Peter |
author_role | aut |
author_sort | Schartner, Peter |
author_variant | p s ps |
building | Verbundindex |
bvnumber | BV013934907 |
classification_rvk | ST 273 ST 276 |
classification_tum | DAT 460f DAT 465f |
ctrlnum | (OCoLC)76329009 (DE-599)BVBBV013934907 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV013934907</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20060503</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">011001s2001 gw ad|| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">963131443</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3936052026</subfield><subfield code="9">3-936052-02-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)76329009</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV013934907</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-12</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Schartner, Peter</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security tokens</subfield><subfield code="b">[basics, applications, management, infrastructures]</subfield><subfield code="c">Peter Schartner</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Höhenkirchen</subfield><subfield code="b">IT, Verl. für Informationstechnik</subfield><subfield code="c">2001</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">VIII, 243 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">IT security & IT management</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Überwachungseinrichtung</subfield><subfield code="0">(DE-588)4186655-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugang</subfield><subfield code="0">(DE-588)4191103-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Automatische Identifikation</subfield><subfield code="0">(DE-588)4206098-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Zugang</subfield><subfield code="0">(DE-588)4191103-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Überwachungseinrichtung</subfield><subfield code="0">(DE-588)4186655-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Zugang</subfield><subfield code="0">(DE-588)4191103-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Automatische Identifikation</subfield><subfield code="0">(DE-588)4206098-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009536234&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-009536234</subfield></datafield></record></collection> |
id | DE-604.BV013934907 |
illustrated | Illustrated |
indexdate | 2024-08-14T00:42:02Z |
institution | BVB |
isbn | 3936052026 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-009536234 |
oclc_num | 76329009 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-12 |
owner_facet | DE-91 DE-BY-TUM DE-12 |
physical | VIII, 243 S. Ill., graph. Darst. |
publishDate | 2001 |
publishDateSearch | 2001 |
publishDateSort | 2001 |
publisher | IT, Verl. für Informationstechnik |
record_format | marc |
series2 | IT security & IT management |
spelling | Schartner, Peter Verfasser aut Security tokens [basics, applications, management, infrastructures] Peter Schartner Höhenkirchen IT, Verl. für Informationstechnik 2001 VIII, 243 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier IT security & IT management Überwachungseinrichtung (DE-588)4186655-1 gnd rswk-swf Zugang (DE-588)4191103-9 gnd rswk-swf Automatische Identifikation (DE-588)4206098-9 gnd rswk-swf Zugang (DE-588)4191103-9 s Überwachungseinrichtung (DE-588)4186655-1 s DE-604 Automatische Identifikation (DE-588)4206098-9 s HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009536234&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Schartner, Peter Security tokens [basics, applications, management, infrastructures] Überwachungseinrichtung (DE-588)4186655-1 gnd Zugang (DE-588)4191103-9 gnd Automatische Identifikation (DE-588)4206098-9 gnd |
subject_GND | (DE-588)4186655-1 (DE-588)4191103-9 (DE-588)4206098-9 |
title | Security tokens [basics, applications, management, infrastructures] |
title_auth | Security tokens [basics, applications, management, infrastructures] |
title_exact_search | Security tokens [basics, applications, management, infrastructures] |
title_full | Security tokens [basics, applications, management, infrastructures] Peter Schartner |
title_fullStr | Security tokens [basics, applications, management, infrastructures] Peter Schartner |
title_full_unstemmed | Security tokens [basics, applications, management, infrastructures] Peter Schartner |
title_short | Security tokens |
title_sort | security tokens basics applications management infrastructures |
title_sub | [basics, applications, management, infrastructures] |
topic | Überwachungseinrichtung (DE-588)4186655-1 gnd Zugang (DE-588)4191103-9 gnd Automatische Identifikation (DE-588)4206098-9 gnd |
topic_facet | Überwachungseinrichtung Zugang Automatische Identifikation |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009536234&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT schartnerpeter securitytokensbasicsapplicationsmanagementinfrastructures |