Figure 3 - uploaded by Harald Vogt
Content may be subject to copyright.
2: Example for a possible attack: Bob impersonates Alice 

2: Example for a possible attack: Bob impersonates Alice 

Source publication
Article
Full-text available
Abstract The CASTING project is concerned with the application of smart card technology in combination with short distance wireless communication. This report focuses on secure access to Web pages, meaning that the right person has access to his or her personal Web pages in a manner that respects integrity, authenticity and confidentiality. This re...

Similar publications

Article
Full-text available
Security Socket Layer (SSL) / Transport Layer Security (TLS) protocols are utilized to secure network communication (e.g., transmitting user data). Failing to properly implement SSL/TLS configuration during the app development results in security risks. The weak implementations include trusting all host names, trusting all certificates, ignoring ce...

Citations

... In past projects, such as the CASTING project [1], a GSM phone has been proposed as a tool for authentication and for the storage of confidential information. In that case, private keys were securely stored on a SIM card that was able to communicate with a desktop PC using the SECTUS protocol, an ad hoc wireless protocol. ...
Conference Paper
Full-text available
This paper addresses the problem of using networked mobile devices as providers of cryptographic functions. More specifically the paper describes a system developed to allow the usage of portable devices, such as PDAs and mobile phones, as remote smart card readers when connected into a TCP/IP network. This system is completely transparent to desktop applications. The digital signature technology, at its highest level of security, requires the use of smart cards and smart card readers not yet widely deployed. This requirement limits the mobility and may turn out to be an obstacle to the wide adoption of the digital signature technology. Our work aims precisely at facilitating the adoption of the smart card technology by means of PDAs and mobile phones.
... In this scenario the card is inserted into a card reader equipped with input and output facilities. In a prototypical implementation described in [RV01] a mobile phone was used as the wireless card reader and demonstrated the integration of a RSA-enabled GSM SIM smartcard over an Infrared link as the security module for client-side authentication of a TLS-protected [RFC2246] HTTP session. ...