Issue No. 04 - April (2005 vol. 54)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/TC.2005.70
The necessity of securing the communication between hardware components in embedded systems becomes increasingly important with regard to the secrecy of data and particularly its commercial use. We suggest a low-cost (i.e., small logic-area) solution for flexible security levels and short key lifetimes. The basis is an approach for symmetric key exchange using the synchronization of Tree Parity Machines. Fast successive key generation enables a key exchange within a few milliseconds, given realistic communication channels with a limited bandwidth. For demonstration, we evaluate characteristics of a standard-cell ASIC design realization as IP-core in 0.18µ-technology.
Security, authentication, algorithms implemented in hardware, ubiquitous computing, pervasive computing.
S. Wallner and M. Volkmer, "Tree Parity Machine Rekeying Architectures," in IEEE Transactions on Computers, vol. 54, no. , pp. 421-427, 2005.