Towards Hardware-Intrinsic Security Foundations and Practice
Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is
- PDF / 291,109 Bytes
- 16 Pages / 439.37 x 666.142 pts Page_size
- 108 Downloads / 201 Views
For further volumes: http://www.springer.com/series/4752
Ahmad-Reza Sadeghi · David Naccache Editors
Towards Hardware-Intrinsic Security Foundations and Practice Foreword by Pim Tuyls
123
Editors Prof. Ahmad-Reza Sadeghi Universität Bochum Horst Görtz Institut für Sicherheit in der Informationstechnik Universitätsstr. 150 44780 Bochum Germany [email protected]
Prof. David Naccache École Normale Supérieure Dépt. Informatique rue d’Ulm 45 75230 Paris CX 05 France [email protected]
Series Editors Prof. Dr. David Basin Prof. Dr. Ueli Maurer ETH Zürich Switzerland [email protected] [email protected]
ISSN 1619-7100 ISBN 978-3-642-14451-6 e-ISBN 978-3-642-14452-3 DOI 10.1007/978-3-642-14452-3 Springer Heidelberg Dordrecht London New York Library of Congress Control Number: 2010938038 ACM Computing Classification (1998): E.3, K.6.5, B.7, C.2 c Springer-Verlag Berlin Heidelberg 2010 This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. Cover design: KuenkelLopka GmbH, Heidelberg Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com)
Foreword
Nowadays, computing devices are omnipresent. The vision of the Ambient Intelligent society is becoming a reality very rapidly. Information is exchanged at the speed of light, everybody is connected anytime and anywhere, and new technological developments in the world are taking place faster than ever before. This evolution is the result of the progress in semi-conductor manufacturing processes and technologies which make ICs every year smaller, faster, and more powerful. Mobile devices, (smart) phones, PCs, laptops, smart cards, RFID-tags, personal secure tokens, sensors, etc., are typical products enabling ambient intelligence. Within this environment, information has become one of the most valuable goods and its early availability often means a competitive advantage or a guarantee to our overall security and safety. Human beings on the one hand and industrial as well as governmental organizations on the other hand have become highly dependent on the availability, accessibility, and the flow of correct information for their everyday operations. Without proper protection, however, information is at the same time the Achilles heel of su
Data Loading...