Skip to main content

The Key

  • Chapter
  • First Online:
Security in Embedded Devices

Part of the book series: Embedded Systems ((EMSY))

  • 1580 Accesses

Abstract

This chapter will introduce the key, which is perhaps one of the most important aspects of any cryptographic system. A system is only as secure as the key. This was noted by Auguste Kerckhoffs in the nineteenth century and has since become known as Kerchoffs’ principle. Random values, secrets, keys, physically unclonable functions (PUFs), and trusted key storage will be covered in this chapter along with functions used to create, update, or freshen keys. Other important characteristics to be discussed include key length, key lifetime, key backup, key destruction, key recovery, and key revocation. An introduction to security equivalence is also provided since this relies heavily on key length. Various methods for storage of keys will be outlined along with a discussion of trusted platform modules (TPMs). In addition, a networks on chip (NoC) view of keys and their storage and use are also provided.

The specific value of keys may also be constrained by the cryptographic application in which they are used. For example, typically there are fewer constraints on symmetric keys as compared with public–private key pairs where special mathematical properties are required. Various techniques for generating keys and tests for randomness will be discussed in this chapter. In cryptographic theory, there are two general types of keys, symmetric keys and public (or asymmetric) keys (see Chaps. 4 and 5). There are different approaches to implementing public key schemes such as those based upon integer factorization (such as RSA), discrete logarithms (DSA, ElGamal), both discussed in Chap. 4 and Elliptical curve discrete logarithms (ECC), discussed in Chap. 5. Key distribution center, or KDC, key translation center, or KTC, and certificate authorities (CA) are third parties or trusted sources and are discussed further in Chap. 4. A more in-depth discussion of other key systems, such as identity key systems, can be found in Menezes et al. (1996). This chapter will discuss key generation and characteristics including key length, an important parameter dictating security, as well as how keys are restricted to be used with different sets of applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Abelson H et al (1998) The risks of key recovery, key escrow, trusted third party and encryption. Ad Hoc Group of Cryptographers and Computer Scientists. http://www.cdt.org/crypto/risks98/

  • Atmel (2008) AT97SC3203S trusted platform module, Vers 1.2, SMBus Two-wire interface summary document. http://www.atmel.com/dyn/resources/prod_documents/5132s.pdf

  • Barker E, Barker W, Burr W, Polk W, Smid M (2007) Recommendation for key management – Part 1: General (Revised). NIST Special publication 800–57

    Google Scholar 

  • Biham E, Shamir A (1990) Differential cryptanalysis of DES-like cryptosystems. In: Advances in cryptology, CRYPTO ‘90. doi = 10.1.1.56.1367. Springer, Berlin, pp 2–21

    Google Scholar 

  • Dichtl M, Golic JDj (2007) High-Speed true random number generation with logic gates only. In: Paillier P, Verbauwhede I (eds) CHES 2007, LNCS, vol. 4727. Springer, Berlin

    Google Scholar 

  • Gebotys C, Gebotys R (2003) A framework for security on NoC technologies. In: IEEE proceedings of annual symposium on VLSI

    Google Scholar 

  • Gebotys C, Zhang Y (2003) Security wrappers and power analysis for SoC technologies. In: Proceedings of ACM/IEEE/IFIP international conference on hardware/software codesign and system synthesis, pp 162–167

    Google Scholar 

  • Hardjono T, Kazmierczak G (2008) Overview of the TPM key management standard. TCG presentation. http://www.trustedcomputinggroup.org/

  • Huang A (2002) Keeping secrets in hardware: the Microsoft xbox study. MIT AI laboratory, AI Memo 2002–2008. http://www.ai.mit.edu

  • Jun B, Kocher P (1999) The Intel random number generator. Cryptography research, Inc. White paper prepared for Intel corporation

    Google Scholar 

  • Kinney S (2006) Trusted platform module basics: using TPM in embedded systems. Newnes, Oxford.

    Google Scholar 

  • Kocher PC (1999) Leak-resistant cryptographic indexed key update. US Patent 6,539,092, 2003

    Google Scholar 

  • Lofstrom K, Daasch WR, Taylor D (2000) Identification circuit using device mismatch. In: Proceedings of ISSCC 2000

    Google Scholar 

  • Menezes A, van Oorschot P, Vanstone S (1996) Handbook of applied cryptography. CRC, Boca Raton, FL

    Book  Google Scholar 

  • Pappu R (2001) Physical one-way functions. PhD thesis, Massachusetts Institute of Technology

    Google Scholar 

  • Schneier B (1996) Applied cryptography. Wiley, New York

    Google Scholar 

  • Shamir A, Van Someren N (1998) Playing hide and seek with stored keys. In: Financial cryptography 1998, LNCS, vol. 1648. doi: 10.1007/3–540–48390-X 1999. Springer, Berlin, pp 118–124

    Google Scholar 

  • Skoric B, Tuyls P, Ophey W (2005) Robust key extraction from physical unclonable functions. In: Proceedings of the applied cryptography and network security conference 2005, LNCS, vol. 3531

    Google Scholar 

  • Stinson DR (2006) Cryptography, 3rd edn. Chapman and Hall/CRC, London/Boca Raton, FL

    MATH  Google Scholar 

  • Suh GE, Devadas S (2007) Physical unclonable functions for device authentication and secret key generation

    Google Scholar 

  • TCG Web site. http://www.trustedcomputinggroup.org/

  • Vasyltsov I et al (2008) Fast digital TRNG based on metastable ring oscillator, CHES 2008, LNCS, vol. 5154, IACR. Springer, Berlin, pp 146–163

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Catherine H. Gebotys .

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Gebotys, C.H. (2010). The Key. In: Security in Embedded Devices. Embedded Systems. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-1530-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-1-4419-1530-6_3

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4419-1529-0

  • Online ISBN: 978-1-4419-1530-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics