Security in Embedded Devices

Security in Embedded Devices Cathy Gebotys Although security is prevalent in PCs, wireless communications and other systems today, it is expected to become increasingly important and widespread in many embedded devices. For some time, typical embedded sys

  • PDF / 123,446 Bytes
  • 3 Pages / 439.37 x 666.142 pts Page_size
  • 98 Downloads / 229 Views

DOWNLOAD

REPORT


AES, 113, 116, 117, 120, 121, 127, 138–142 affine, 94–97 all keys plot, 185, 186, 191 alpha particles, 264 ANS, 39 ATM, 8 attack manipulation attack, 16 monitoring attack, 16 probing attack, 15 Replay, 16 Substitution attack, 16 Attacks Spoofing, 16 attacks Splicing, 17 authenticated encryption, 2 automobiles, 14–16, 21–23

base point, 82, 105 bases, 80, 83, 84, 93 binary field, 85, 87, 89, 91, 97 Black Chamber, 9 brute force attack, 2, 6

Caesar cipher, 5, 6 CCM, 272 cellphones, 15, 20, 21 certificate, 29, 35, 42, 43, 50, 57, 63 Certificate Authority, 35 chaining, 7 challenge-response protocol, 5 channel, 1–3, 5, 8–10 cipher wheel, 6 ciphertext, 1 compression, 293, 294 computation resistance, 145, 147 Confusion, 111, 115

Contactless, 17–19, 26 control vector, 35, 36, 40 cryptanalysis, 2 cryptoperiod, 35

Data authentication, 143 Data integrity, 143, 154 Data-origin authentication, 143 DES, 8, 11 3DES, 113, 116, 139 DESX, 115 differential analysis, 165, 166, 172, 176, 179, 185, 189, 190, 192, 194, 213, 218 differential trace, 181, 182, 185–187 Diffie-Hellman, 58, 68–71 Diffusion, 111 digital signature, 104, 107 drive-by-wire, 21, 22 DSA, 49, 71–73 DSP, 94, 105, 108, 109

ECDSA, 100, 104, 105, 107, 109 ECIES, 3, 100, 102, 103 ECMQV, 100–102 Electromagnetic, 1 ElGamal, 49, 73 elliptic, 75, 76, 78–80, 84–91, 93–95, 98–101, 103, 105, 107–109 elliptic curve cryptography, 75, 76, 79, 85, 93, 107, 108 emanations, 9, 10 Enigma, 8 Entity authentication, 144 entropy, 8 ephemeral, 3, 4 Euler, 64

295

296 Field, 77, 84, 90, 94, 98 FIPS, 292 FIT, 265, 269, 272, 275 FPGA, 13, 24–26 frequency based analysis, 224, 225

GCM, 137–142 great seal, 10 group, 75, 77–79, 84, 106

Hamming weight, 231 Hash, 143, 145, 147, 158, 160, 161 hash, 2, 4

initialization vector, 41 inversion, 77, 90, 91, 94, 95, 97

Jefferson cylinder, 7 JTAG, 48

KDC, 29, 35 Kerberos protocol, 57 Kerchoffs, 29 key, 1–9 key derivation function, 35, 102, 103 key derivation function KDF, 35 Key escrow, 40 key establishment, 99, 100 Kocher, 8, 9

level, 291 LFSR, 31, 33 lightweight, 124, 128, 138, 140, 141 lock, 50–53, 59–61, 68

MAC, 2–4, 144–148, 150–152, 156 Mary Queen of Scots, 6 masking, 224, 228–231, 234–237, 239, 241, 243, 244, 255, 261 MDC, 143–145, 147, 149, 150, 152 Morse code, 9

nanotechnology, 294 Needham-Schroeder protocol, 56 No-Shared Key Message Transfer, 53 NoC, 29, 44–46, 48

Index non-adjacent form NAF, 82 nonce, 41 nonrepudiation, 5

one-way, 32, 35, 36 oscillator, 31, 33, 48

password, 38, 40–42 PDA, 20, 21, 26 PIN, 8 plaintext, 1 point, 75, 76, 78–85, 88–106, 108 point at infinity, 78, 79, 84, 98 point multiplication, 76, 79, 80, 82, 83, 94, 95, 99, 100, 102, 103, 105, 106 polyalphabetic cipher, 6, 8 Polybius checker board, 5 polynomial, 119, 129, 130, 132, 133 power, 292, 293 private key, 3 projective, 85, 95–97 protocol, 51–57, 60, 62, 63, 65–72 public key, 3, 49, 57–66, 68, 69, 71, 72 public key scheme, 69 PUF, 32–34

quantum cryptography, 294

Rabin, 66–68, 73 random, 30–34, 41, 46–48 reliable, 263, 265, 275, 278, 283, 285–288 replay atta