23 research outputs found

    A Device to Generate a Machine Specific Identification Key

    No full text
    An integrated circuit assembly having monitoring circuitry for observing the internal signals of the system so that its properties are captured. The system properties are manipulated so that they can be used as a pseudo random number and or as the basis number for an encryption key. The monitoring circuitry having: manipulation circuitry to transform monitored data and combine it with previously manipulated values; and registers to store previously manipulated values; and counters to count events; and condition detection circuitry for detecting when a signal is at a specific value or range of values. Optionally the monitoring circuitry which has the functionality for capturing system properties may be combined with other monitoring circuitry, which has the functionality required by a debug support circuit.; The monitoring circuitry avoids replication of resources by sharing parts of specific monitoring circuits like counters

    Integrating Feature Values for Key Generation in an ICmetric System

    No full text
    This paper investigates the practicalities of combining values derived from measurable features of given integrated electronic circuits in order to derive a robust encryption key, a technique termed ICmetrics. Specifically the paper explores options for the precise techniques required to combine the derived feature values in order to ensure key stability. Key stability is an essential component of any encryption system but this must be combined with a guarantee of key diversity between devices. © 2009 IEEE

    Normalizing Discrete Circuit Features with Statistically Independent Values for Incorporation within a Highly Secure Encryption System

    No full text
    Protecting hardware devices from unwanted software attacks is a current area of major security concern. Coupled with the need to secure and verify data sent to and from such devices, the need to supply systems capable of uniquely identifying and securing hardware devices is considerable and imminent. This paper introduces techniques which possess the potential to generate unique identifying codes for given hardware devices based on measurable quantities or features associated with the given hardware and software configurations executing upon it. The techniques are investigated by considering abstract properties in order to validate primarily the feature normalization techniques employed prior to the code generation phase which allows features with highly variable distributions, and whose component values are independent of each other, to be employed within the code generation system

    Key Generation for Secure Inter-Satellite Communication

    No full text
    This paper addresses issues relating to the generation of secure encryption keys for use in inter-satellite communications operating in a low power environment. It introduces techniques which possess the potential to generate encryption keys based on properties or features directly associated with the actual satellites and thus removing the necessity for key storage. This research investigates constraints associated with ensuring secure inter-satellite communications for satellite constellations. The need for data sent to and from satellites to be secure and verified is substantial. Security can be improved by using encryption techniques based on keys, which are based on unique properties of the individual nodes within the satellite network. This will serve both to minimize the need for key sharing as well as to validate the initiator node of a message

    Effects of Feature Trimming on Encryption Key Stability for an ICmetric System

    No full text
    The stable reproduction of an encryption key under potentially varying operating conditions is a fundamental requirement of any encryption key generating system. This paper examines aspects of the generation of encryption keys based on measurable features derived from characteristics of investigated electronic system with a view to determining whether such encryption key generation is sufficiently stable. Specifically, it addresses the effect on encryption key stability of removing unstable contributions to the key generation process, a technique known as feature trimming

    Investigation of Sample Sizes and Correlation in Multi-Cluster Feature Distributions for an Efficient Encryption System

    No full text
    This paper investigates some practical aspects of the employment of measurable features derived from characteristics of given integrated electronic circuits for the generation of encryption keys pertaining to the circuits, a technique termed ICmetrics. Specifically the paper addresses difficulties introduced by features exhibiting highly diverse distributions, potentially containing many distinct clusters associated with each of the given circuits. For such feature distributions, it is crucial to detect the precise number of clusters associated with each given circuit and the paper discusses the consequentially crucial importance of selecting the appropriate number of samples in order to correctly detect and identify the number of clusters. Moreover, the phenomenon of correlation in multi-cluster features is analyzed and methods of how to successively detect it are presented
    corecore