Issue No.04 - April (2005 vol.54)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/TC.2005.70
The necessity of securing the communication between hardware components in embedded systems becomes increasingly important with regard to the secrecy of data and particularly its commercial use. We suggest a low-cost (i.e., small logic-area) solution for flexible security levels and short key lifetimes. The basis is an approach for symmetric key exchange using the synchronization of Tree Parity Machines. Fast successive key generation enables a key exchange within a few milliseconds, given realistic communication channels with a limited bandwidth. For demonstration, we evaluate characteristics of a standard-cell ASIC design realization as IP-core in 0.18µ-technology.
Security, authentication, algorithms implemented in hardware, ubiquitous computing, pervasive computing.
Markus Volkmer, Sebastian Wallner, "Tree Parity Machine Rekeying Architectures", IEEE Transactions on Computers, vol.54, no. 4, pp. 421-427, April 2005, doi:10.1109/TC.2005.70