The Community for Technology Leaders
Green Image
The necessity of securing the communication between hardware components in embedded systems becomes increasingly important with regard to the secrecy of data and particularly its commercial use. We suggest a low-cost (i.e., small logic-area) solution for flexible security levels and short key lifetimes. The basis is an approach for symmetric key exchange using the synchronization of Tree Parity Machines. Fast successive key generation enables a key exchange within a few milliseconds, given realistic communication channels with a limited bandwidth. For demonstration, we evaluate characteristics of a standard-cell ASIC design realization as IP-core in 0.18µ-technology.
Security, authentication, algorithms implemented in hardware, ubiquitous computing, pervasive computing.

S. Wallner and M. Volkmer, "Tree Parity Machine Rekeying Architectures," in IEEE Transactions on Computers, vol. 54, no. , pp. 421-427, 2005.
90 ms
(Ver 3.3 (11022016))