module if needed. For Java, our JCE receiver mod-
ule for example is implemented using only 1000 lines
of prototypical code, router and sending communica-
tions modules do have 80 loc each with a common
protocol definition of 1500 loc. The code of imported
libraries is not included in the numbers given.
6 FUTURE WORK AND
CONCLUSIONS
With MoCrySIL, we present our solution of a secure,
flexible and portable personal key store service one
can carry around in his pocket. MoCrySIL removes
the need for a trusted third party and therefore com-
plements our CrySIL solution well.
Our prototype implementation highlights the flex-
ibility of the CrySIL architecture, shows its potential
and affirms the ease of use for developers and end
users. The security analysis of MoCrySIL indicates
that using hardware-backed key storage facilities on
mobile devices allows to reach a significant level of
security. Due to the uncontrolled environment a mo-
bile device is used in, however, the residual risks for
certain threats is higher than in classic deployment
scenarios. Therefore, MoCrySIL focuses on standard
applications where the hardware-backed key storage
facilities on mobile devices already provide a signif-
icant improvement of the security when compared to
standard software-based key storage solutions.
Future work will extend CrySIL’s feature set and
client APIs and heavily focus on extending the flexi-
bility of the authentication system to allow for an even
wider range of use cases.
REFERENCES
Benaloh, J., Chase, M., Horvitz, E., and Lauter, K. (2009).
Patient controlled encryption: Ensuring privacy of
electronic medical records. In Proceedings of the 2009
ACM Workshop on Cloud Computing Security, CCSW
’09, pages 103–114, New York, NY, USA. ACM.
Bleikertz, S., Bugiel, S., Ideler, H., N
¨
urnberger, S.,
and Sadeghi, A.-R. (2013). Client-controlled
cryptography-as-a-service in the cloud. In Applied
Cryptography and Network Security, volume 7954
of Lecture Notes in Computer Science, pages 19–36.
Springer Berlin Heidelberg.
Butt, S., Lagar-Cavilla, H. A., Srivastava, A., and Gana-
pathy, V. (2012). Self-service cloud computing. In
Proceedings of the 2012 ACM Conference on Com-
puter and Communications Security, CCS ’12, pages
253–264, New York, NY, USA. ACM.
Egele, M., Brumley, D., Fratantonio, Y., and Kruegel, C.
(2013). An empirical study of cryptographic misuse
in android applications. In Proceedings of the 2013
ACM SIGSAC conference on Computer & communi-
cations security - CCS ’13, pages 73–84, New York,
New York, USA. ACM Press.
Fahl, S., Harbach, M., Muders, T., Smith, M., Baumg
¨
artner,
L., and Freisleben, B. (2012). Why eve and mallory
love android. In Proceedings of the 2012 ACM con-
ference on Computer and communications security -
CCS ’12, page 50, New York, New York, USA. ACM
Press.
Kamara, S. and Lauter, K. (2010). Cryptographic cloud
storage. In Lecture Notes in Computer Science, vol-
ume 6054, pages 136–149.
KMIP-v1.1 (2013). Key Management Interoperability Pro-
tocol Specification Version 1.1. OASIS Standard.
Lei, S., Zsihan, D., and Jindi, G. (2010). Research on Key
Management Infrastructure in Cloud Computing En-
vironments. In 9th International Conference on Grid
and Cooperative Computing (GCC), pages 404 – 407,
Nanjing. IEEE.
Leitold, H., Hollosi, A., and Posch, R. (2002). Security
architecture of the Austrian citizen card concept. 18th
Annual Computer Security Applications Conference,
2002. Proceedings.
Reimair, F., Teufl, P., and Zefferer, T. (2015). WebCrySIL -
Web Cryptographic Service Interoperability Layer. In
Web Information Systems and Technologies.
Rocha, F. and Correia, M. P. (2011). Lucy in the sky without
diamonds: Stealing confidential data in the cloud. In
41st International Conference on Dependable Systems
and Networks Workshops (DSN-W), pages 129 – 134,
Hong Kong. IEEE.
Toegl, R., , Reimair, F., and Pirker, M. (2013). Waltzing the
Bear, or: A trusted virtual security module. volume
7868 of Lecture Notes in Computer Science, pages
145–160. Springer Berlin Heidelberg.
Trusted Computing Group (2011). TCG TPM
specification version 1.2 revision 116.
http://www.trustedcomputinggroup.org/resources/
tpm main specification. last visited on January 29,
2013.
SECRYPT2015-InternationalConferenceonSecurityandCryptography
292