DocumentCode
799893
Title
Cryptographic Processors-A Survey
Author
Anderson, Ross ; Bond, Mike ; Clulow, Jolyon ; Skorobogatov, Sergei
Author_Institution
Comput. Lab., Cambridge Univ., UK
Volume
94
Issue
2
fYear
2006
Firstpage
357
Lastpage
369
Abstract
Tamper-resistant cryptographic processors are becoming the standard way to enforce data-usage policies. Their origins lie with military cipher machines and PIN processing in banking payment networks, expanding in the 1990s into embedded applications: token vending machines for prepayment electricity and mobile phone credit. Major applications such as GSM mobile phone identification and pay TV set-top boxes have pushed low-cost cryptoprocessors toward ubiquity. In the last five years, dedicated crypto chips have been embedded in devices such as game console accessories and printer ink cartridges, to control product and accessory after markets. The "Trusted Computing" initiative will soon embed cryptoprocessors in PCs so they can identify each other remotely. This paper surveys the range of applications of tamper-resistant hardware and the array of attack and defense mechanisms which have evolved in the tamper-resistance arms race.
Keywords
cryptography; embedded systems; microprocessor chips; PIN processing; banking payment networks; crypto chips; cryptographic processors; cryptoprocessors; data-usage policy; fault analysis; military cipher machines; mobile phone credit; prepayment electricity; tamper-resistant hardware; token vending machines; trusted computing; Banking; Cryptography; Embedded computing; GSM; Hardware; Ink; Mobile handsets; Personal communication networks; Printers; TV; Cryptoprocessor; HSM; fault analysis; power analysis; security API; semi-invasive attack; survey;
fLanguage
English
Journal_Title
Proceedings of the IEEE
Publisher
ieee
ISSN
0018-9219
Type
jour
DOI
10.1109/JPROC.2005.862423
Filename
1580505
Link To Document