Towards Hardware-Intrinsic Security

Foundations and Practice

  • Ahmad-Reza Sadeghi
  • David Naccache

Part of the Information Security and Cryptography book series (ISC)

Table of contents

  1. Front Matter
    Pages i-xvi
  2. Physically Unclonable Functions (PUFs)

    1. Front Matter
      Pages 1-1
    2. Helena Handschuh, Geert-Jan Schrijen, Pim Tuyls
      Pages 39-53
    3. Inyoung Kim, Abhranil Maiti, Leyla Nazhandali, Patrick Schaumont, Vignesh Vivekraja, Huaiye Zhang
      Pages 55-78
    4. Ulrich Rührmair, Heike Busch, Stefan Katzenbeisser
      Pages 79-96
  3. Hardware-based Cryptography

    1. Front Matter
      Pages 97-97
    2. François-Xavier Standaert, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, Elisabeth Oswald
      Pages 99-134
    3. Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, Berk Sunar, Pim Tuyls
      Pages 135-164
  4. Hardware Attacks

    1. Front Matter
      Pages 165-165
    2. Mohammad Tehranipoor, Berk Sunar
      Pages 167-187
    3. Yoo-Jin Baek, Vanessa Gratzer, Sung-Hyun Kim, David Naccache
      Pages 189-197
  5. Hardware-based Policy Enforcement

    1. Front Matter
      Pages 199-199
    2. Ghaith Hammouri, Aykutlu Dana, Berk Sunar
      Pages 201-222
  6. Hardware-Security in Contactless Tokens

    1. Front Matter
      Pages 235-235
    2. Yong Ki Lee, Lejla Batina, Dave Singelee, Bart Preneel, Ingrid Verbauwhede
      Pages 237-257
    3. Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
      Pages 281-305
  7. Hardware-based Security Architectures and Applications

    1. Front Matter
      Pages 307-307

About this book

Introduction

Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required anymore, and the key is only present in the device for a minimal amount of time. The field is extending to hardware-based security primitives and protocols such as block ciphers and stream ciphers entangled with the hardware, thus improving IC security. While at the application level there is a growing interest in hardware security for RFID systems and the necessary accompanying system architectures. This book brings together contributions from researchers and practitioners in academia and industry, an interdisciplinary group with backgrounds in physics, mathematics, cryptography, coding theory and processor theory. It will serve as important background material for students and practitioners, and will stimulate much further research and development.

Keywords

Contactless tokens Counterfeiting Hardware Hardware attacks Hardware-based cryptography Hardware-intrinsic security Leakage-resilient cryptography Optical media fingerprints Physically Unclonable Function (PUF) Radio-Frequency Identification (RFID) Trojan Horse algorithms coding theory cryptography statistics

Editors and affiliations

  • Ahmad-Reza Sadeghi
    • 1
  • David Naccache
    • 2
  1. 1.Horst Görtz Institut für, Sicherheit in derUniversität BochumBochumGermany
  2. 2.Département d'informatique, Groupe de cryptographieÉcole normale supérieureParisFrance

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-14452-3
  • Copyright Information Springer-Verlag Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-14451-6
  • Online ISBN 978-3-642-14452-3
  • Series Print ISSN 1619-7100
  • About this book