SOLVING THEE-SIGNATURE NON-REPUDIATION PROBLEM

Hani Samuel Kirollos;

Abstract


Signature Creation Devices such as smart cards or tokens that comply with the European E-Signature Directive are vulnerable to Trojan Horses attacks through which an attacker can fraudulently create digital signatures utilizing the user's signature creation device when it is used on an infected computer. The current antivirus technologies cannot fully protect from polymorphic Trojan Horses that change their shapes frequently with time. Hence non-repudiation cannot be satisfied because the signor cannot ultimately protect himself

Existing solutions in the prior art have vanous limitations, including device size, suitability for un-trusted computers such as Internet cafe computers and scalability with regards to the size of the data that can be reviewed and signed.

The solution presented is an adaptation to smart cards and smart tokens. It enables tlte user to detect any malicious activity, whether software-based or firmware-based, so that only what the user wants to sign gets signed. Additionally, the same adaptation components realize secure biometric authentication.

Also, a method for enteting secrets securely to the smart card or smart token ts presented.


Other data

Title SOLVING THEE-SIGNATURE NON-REPUDIATION PROBLEM
Other Titles حل فنى لمشكلة الحجية القانونية للتوقيع الالكترونى
Authors Hani Samuel Kirollos
Issue Date 2007

Attached Files

File SizeFormat
B10970.pdf344.27 kBAdobe PDFView/Open
Recommend this item

Similar Items from Core Recommender Database

Google ScholarTM

Check

views 2 in Shams Scholar
downloads 1 in Shams Scholar


Items in Ain Shams Scholar are protected by copyright, with all rights reserved, unless otherwise indicated.