Nowadays, people carry around devices (cell phones, PDAs, bank passes, etc.) that have a high value. That value is often contained in the data stored in it or lies in the services the device can grant access to (by using secret identification information stored in it). These devices often operate in hostile environments and their protection level is not adequate to deal with that situation. Bank passes and credit cards contain a magnetic stripe where identification information is stored. In the case of bank passes, a PIN is additionally required to withdraw money from an ATM (Automated Teller Machine). At various occasions, it has been shown that by placing a small coil in the reader, the magnetic information stored in the stripe can easily be copied and used to produce a cloned card. Together with eavesdropping the PIN (by listening to the keypad or recording it with a camera), an attacker can easily impersonate the legitimate owner of the bank pass by using the cloned card in combination with the eavesdropped PIN.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag London Limited
About this chapter
Cite this chapter
Skoric, B., Schrijen, GJ., Tuyls, P., Ignatenko, T., Willems, F. (2007). Secure Key Storage with PUFs. In: Tuyls, P., Skoric, B., Kevenaar, T. (eds) Security with Noisy Data. Springer, London. https://doi.org/10.1007/978-1-84628-984-2_16
Download citation
DOI: https://doi.org/10.1007/978-1-84628-984-2_16
Publisher Name: Springer, London
Print ISBN: 978-1-84628-983-5
Online ISBN: 978-1-84628-984-2
eBook Packages: Computer ScienceComputer Science (R0)