Hardware generated keys for cryptographic systems and protocols

Hardverově generované klíče pro kryptografické systémy a protokoly

Editors

Other contributors

Journal Title

Journal ISSN

Volume Title

Publisher

České vysoké učení technické v Praze
Czech Technical University in Prague

Research Projects

Organizational Units

Journal Issue

Abstract

The main topic of this dissertation thesis is the generation of cryptographic keys in hardware and embedded systems. For lightweight and embedded devices, the True Random Number Generators (TRNGs) are usually implemented, utilizing non-deterministic eects in analogue or digital circuits, since this is resource and power ecient way. In the dissertation thesis we propose and analyze the secure TRNG design, as well as we deal with the proper testing of hardware based TRNG, attempting also attacking the device. Further, we present the authentication protocols based on Physically Unclonable Function (PUF) as the PUFs usage is promising to solve the issue of secure storage of cryptographic keys. Instead of storing the key in memory, the key is generated at the time it is needed. We designed combined PUF/TRNG circuit as a suitable alternative for the purpose of key generation and authentication. We show the possibilities of securing communication and authentication of the embedded systems and simple micro-controllers used in Internet of Things (IoT) devices, using PUF and TRNG for secure key generation, without requirement to store secrets on the device itself, thus allowing to signicantly simplify the problem of key management on the simple hardware devices and micro-controllers.

The main topic of this dissertation thesis is the generation of cryptographic keys in hardware and embedded systems. For lightweight and embedded devices, the True Random Number Generators (TRNGs) are usually implemented, utilizing non-deterministic eects in analogue or digital circuits, since this is resource and power ecient way. In the dissertation thesis we propose and analyze the secure TRNG design, as well as we deal with the proper testing of hardware based TRNG, attempting also attacking the device. Further, we present the authentication protocols based on Physically Unclonable Function (PUF) as the PUFs usage is promising to solve the issue of secure storage of cryptographic keys. Instead of storing the key in memory, the key is generated at the time it is needed. We designed combined PUF/TRNG circuit as a suitable alternative for the purpose of key generation and authentication. We show the possibilities of securing communication and authentication of the embedded systems and simple micro-controllers used in Internet of Things (IoT) devices, using PUF and TRNG for secure key generation, without requirement to store secrets on the device itself, thus allowing to signicantly simplify the problem of key management on the simple hardware devices and micro-controllers.

Description

Citation

Endorsement

Review

Supplemented By

Referenced By