Hardware generated keys for cryptographic systems and protocols
Hardverově generované klíče pro kryptografické systémy a protokoly
Authors
Supervisors
Reviewers
Editors
Other contributors
Journal Title
Journal ISSN
Volume Title
Publisher
České vysoké učení technické v Praze
Czech Technical University in Prague
Czech Technical University in Prague
Date
Abstract
The main topic of this dissertation thesis is the generation of cryptographic keys in hardware and embedded systems. For lightweight and embedded devices, the True Random Number Generators (TRNGs) are usually implemented, utilizing non-deterministic eects in analogue or digital circuits, since this is resource and power ecient way. In the dissertation thesis we propose and analyze the secure TRNG design, as well as we deal with the proper testing of hardware based TRNG, attempting also attacking the device. Further, we present the authentication protocols based on Physically Unclonable Function (PUF) as the PUFs usage is promising to solve the issue of secure storage of cryptographic keys. Instead of storing the key in memory, the key is generated at the time it is needed. We designed combined PUF/TRNG circuit as a suitable alternative for the purpose of key generation and authentication. We show the possibilities of securing communication and authentication of the embedded systems and simple micro-controllers used in Internet of Things (IoT) devices, using PUF and TRNG for secure key generation, without requirement to store secrets on the device itself, thus allowing to signicantly simplify the problem of key management on the simple hardware devices and micro-controllers.
The main topic of this dissertation thesis is the generation of cryptographic keys in hardware and embedded systems. For lightweight and embedded devices, the True Random Number Generators (TRNGs) are usually implemented, utilizing non-deterministic eects in analogue or digital circuits, since this is resource and power ecient way. In the dissertation thesis we propose and analyze the secure TRNG design, as well as we deal with the proper testing of hardware based TRNG, attempting also attacking the device. Further, we present the authentication protocols based on Physically Unclonable Function (PUF) as the PUFs usage is promising to solve the issue of secure storage of cryptographic keys. Instead of storing the key in memory, the key is generated at the time it is needed. We designed combined PUF/TRNG circuit as a suitable alternative for the purpose of key generation and authentication. We show the possibilities of securing communication and authentication of the embedded systems and simple micro-controllers used in Internet of Things (IoT) devices, using PUF and TRNG for secure key generation, without requirement to store secrets on the device itself, thus allowing to signicantly simplify the problem of key management on the simple hardware devices and micro-controllers.
The main topic of this dissertation thesis is the generation of cryptographic keys in hardware and embedded systems. For lightweight and embedded devices, the True Random Number Generators (TRNGs) are usually implemented, utilizing non-deterministic eects in analogue or digital circuits, since this is resource and power ecient way. In the dissertation thesis we propose and analyze the secure TRNG design, as well as we deal with the proper testing of hardware based TRNG, attempting also attacking the device. Further, we present the authentication protocols based on Physically Unclonable Function (PUF) as the PUFs usage is promising to solve the issue of secure storage of cryptographic keys. Instead of storing the key in memory, the key is generated at the time it is needed. We designed combined PUF/TRNG circuit as a suitable alternative for the purpose of key generation and authentication. We show the possibilities of securing communication and authentication of the embedded systems and simple micro-controllers used in Internet of Things (IoT) devices, using PUF and TRNG for secure key generation, without requirement to store secrets on the device itself, thus allowing to signicantly simplify the problem of key management on the simple hardware devices and micro-controllers.