DocumentCode :
3322168
Title :
Challenges in designing trustworthy cryptographic co-processors
Author :
Graves, Ricardo ; Di Natale, Giorgio ; Batina, Lejla ; Bhasin, Shivam ; Ege, Baris ; Fournaris, Apostolos ; Mentens, Nele ; Picek, Stjepan ; Regazzoni, Francesco ; Rozic, Vladimir ; Sklavos, Nicolas ; Bohan Yang
Author_Institution :
IST, Univ. de Lisboa, Lisbon, Portugal
fYear :
2015
fDate :
24-27 May 2015
Firstpage :
2009
Lastpage :
2012
Abstract :
Security is becoming ubiquitous in our society. However, the vulnerability of electronic devices that implement the needed cryptographic primitives has become a major issue. This paper starts by presenting a comprehensive overview of the existing attacks to cryptography implementations. Thereafter, the state-of-the-art on some of the most critical aspects of designing cryptographic co-processors are presented. This analysis starts by considering the design of asymmetrical and symmetrical cryptographic primitives, followed by the discussion on the design and online testing of True Random Number Generation. To conclude, techniques for the detection of Hardware Trojans are also discussed.
Keywords :
cryptography; invasive software; microprocessor chips; random number generation; asymmetrical cryptographic primitives; cryptographic coprocessors; electronic devices; hardware Trojans; true random number generation; Elliptic curve cryptography; Hardware; Resistance; Testing; Trojan horses;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Circuits and Systems (ISCAS), 2015 IEEE International Symposium on
Conference_Location :
Lisbon
Type :
conf
DOI :
10.1109/ISCAS.2015.7169070
Filename :
7169070
Link To Document :
بازگشت