【24h】

Read-Proof Hardware from Protective Coatings

机译:防护涂层的防读硬件

获取原文
获取原文并翻译 | 示例

摘要

In cryptography it is assumed that adversaries only have black box access to the secret keys of honest parties. In real life, however, the black box approach is not sufficient because attackers have access to many physical means that enable them to derive information on the secret keys. In order to limit the attacker's ability to read out secret information, the concept of Algorithmic Tamper Proof (ATP) security is needed as put forth by Gennaro, Lysyanskaya, Malkin, Micali and Rabin. An essential component to achieve ATP security is read-proof hardware. In this paper, we develop an implementation of read-proof hardware that is resistant against invasive attacks. The construction is based on a hardware and a cryptographic part. The hardware consists of a protective coating that contains a lot of randomness. By performing measurements on the coating a fingerprint is derived. The cryptographic part consists of a Fuzzy Extractor that turns this fingerprint into a secure key. Hence no key is present in the non-volatile memory of the device. It is only constructed at the time when needed, and deleted afterwards. A practical implementation of the hardware and the cryptographic part is given. Finally, experimental evidence is given that an invasive attack on an IC equipped with this coating, reveals only a small amount of information on the key.
机译:在密码学中,假定对手只能对诚实方的秘密密钥进行黑匣子访问。但是,在现实生活中,黑匣子方法是不够的,因为攻击者可以使用许多物理手段来使他们获得有关秘密密钥的信息。为了限制攻击者读取秘密信息的能力,需要由Gennaro,Lysyanskaya,Malkin,Micali和Rabin提出的算法防篡改(ATP)安全概念。防读取硬件是实现ATP安全的重要组件。在本文中,我们开发了一种可抵抗入侵性攻击的防读硬件的实现。该构造基于硬件和加密部分。硬件由保护涂层组成,该涂层包含许多随机性。通过在涂层上进行测量,得出指纹。加密部分由模糊提取器组成,该提取器可将此指纹转换为安全密钥。因此,设备的非易失性存储器中没有密钥。它仅在需要时构造,然后再删除。给出了硬件和加密部分的实际实现。最后,实验证据表明,对配备有这种涂层的IC的侵入式攻击只能揭示钥匙上的少量信息。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号