DocumentCode :
1245578
Title :
Tree parity machine rekeying architectures
Author :
Volkmer, Markus ; Wallner, Sebastian
Author_Institution :
Dept. of Comput. Eng. VI, Hamburg Univ. of Technol., Germany
Volume :
54
Issue :
4
fYear :
2005
fDate :
4/1/2005 12:00:00 AM
Firstpage :
421
Lastpage :
427
Abstract :
The necessity of securing the communication between hardware components in embedded systems becomes increasingly important with regard to the secrecy of data and particularly its commercial use. We suggest a low-cost (i.e., small logic-area) solution for flexible security levels and short key lifetimes. The basis is an approach for symmetric key exchange using the synchronization of tree parity machines. Fast successive key generation enables a key exchange within a few milliseconds, given realistic communication channels with a limited bandwidth. For demonstration, we evaluate characteristics of a standard-cell ASIC design realization as IP-core in 0.18μ-technology.
Keywords :
application specific integrated circuits; computer architecture; embedded systems; message authentication; public key cryptography; telecommunication security; ubiquitous computing; IP-core; embedded system; hardware component; pervasive computing; realistic communication channel; rekeying architectures; secure communication; security authentication; standard-cell ASIC design realization; symmetric key exchange; tree parity machine; ubiquitous computing; Bandwidth; Communication channels; Communication system security; Costs; Data security; Elliptic curve cryptography; Embedded system; Hardware; Pervasive computing; Power system protection; Index Terms- Security; algorithms implemented in hardware; authentication; pervasive computing.; ubiquitous computing;
fLanguage :
English
Journal_Title :
Computers, IEEE Transactions on
Publisher :
ieee
ISSN :
0018-9340
Type :
jour
DOI :
10.1109/TC.2005.70
Filename :
1401861
Link To Document :
بازگشت