The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - April (2005 vol.54)
pp: 421-427
ABSTRACT
The necessity of securing the communication between hardware components in embedded systems becomes increasingly important with regard to the secrecy of data and particularly its commercial use. We suggest a low-cost (i.e., small logic-area) solution for flexible security levels and short key lifetimes. The basis is an approach for symmetric key exchange using the synchronization of Tree Parity Machines. Fast successive key generation enables a key exchange within a few milliseconds, given realistic communication channels with a limited bandwidth. For demonstration, we evaluate characteristics of a standard-cell ASIC design realization as IP-core in 0.18µ-technology.
INDEX TERMS
Security, authentication, algorithms implemented in hardware, ubiquitous computing, pervasive computing.
CITATION
Markus Volkmer, Sebastian Wallner, "Tree Parity Machine Rekeying Architectures", IEEE Transactions on Computers, vol.54, no. 4, pp. 421-427, April 2005, doi:10.1109/TC.2005.70
18 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool