Table of Contents Author Guidelines Submit a Manuscript
International Journal of Reconfigurable Computing
Volume 2011, Article ID 820454, 19 pages
http://dx.doi.org/10.1155/2011/820454
Review Article

A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices

Institute for Information Processing Technology, Karlsruhe Institute of Technology (KIT), 76021 Karlsruhe, Germany

Received 27 August 2010; Revised 5 February 2011; Accepted 10 February 2011

Academic Editor: Michael Hübner

Copyright © 2011 Alexander Klimm et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. H. Wallentowitz and K. Reif, Handbuch Kraftfahrzeugelektronik: Grundlagen, Komponenten, Systeme, Anwendungen, Vieweg, Wiesbaden, Germany, 2006.
  2. Hilti Corporation, “Electronic theft protection”.
  3. R. M. Needham and M. D. Schroeder, “Using encryption for authentication in large networks of computer,” Communications of the ACM, vol. 21, no. 12, pp. 993–999, 1978. View at Publisher · View at Google Scholar · View at Scopus
  4. T. Okamoto, “Provably secure and practical identification schemes and corresponding signature schemes,” in Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '93), pp. 31–53, Springer, Santa Barbara, Calif, USA, 1993.
  5. C. P. Schnorr, “Efficient identification and signatures for smart cards,” in Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '89), pp. 239–252, Springer, Santa Barbara, Calif, USA, August 1989.
  6. HIS Security Module Specification v1.1, Herstellerinitiative Software (HIS), 2006, http://www.automotive-his.de/.
  7. HIS-Presentation 2004-05, Herstellerinitiative Software (HIS), 2005, http://www.automotive-his.de/.
  8. G. de Boer, P. Engel, and W. Praefcke, “Generic remote software update for vehicle ecus using a telematics device as a gateway,” Advanced Microsystems for Automotive Applications, pp. 371–380, 2005. View at Google Scholar
  9. A. Adelsbach, U. Huber, and A.-R. Sadeghi, “Secure software delivery and installation in embedded systems,” in Proceedings of the 1st International Conference on Information Security, Practice and Experience (ISPEC '05), R. H. Deng, Ed., vol. 3439 of Lecture Notes in Computer Science, pp. 255–267, April 2005.
  10. G. Dr-Ing and H. Brinkmeyer, “Authentikationsverfahren für fahrzeuganwendungen,” VDI-Berichte, no. 1287, pp. 819–833, 1996. View at Google Scholar
  11. Microchip, “Keeloq authentication products,” http://www.microchip.com/stellent/idcplg?IdcService=SS_GET_PAGE&nodeId=2074.
  12. B. Drisch and T. Zeggel, “Unterstützende Hardware-sicherheitsmodule für Automotive-anwendungen: voraussetzungen für die sichere umsetzung kryptographischer verfahren in fahrzeug-steuergeräten,” VDI Berichte, no. 2016, pp. 147–156, 2007. View at Google Scholar · View at Scopus
  13. L. Batina, N. Mentens, K. Sakiyama, B. Preneel, and I. Verbauwhede, “Public-key cryptography on the top of a needle,” in Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS '07), pp. 1831–1834, May 2007. View at Scopus
  14. W. Diffie and M. E. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644–654, 1976. View at Google Scholar · View at Scopus
  15. A. Klimm, O. Sander, J. Becker, and S. Subileau, “A hardware/software codesign of a co-processor for real-time hyperelliptic curve cryptography on a spartan3 fpga,” in Proceedings of the 21st International Conference on Architecture of Computing Systems (ARCS '08), U. Brinkschulte, T. Ungerer, C. Hochberger, and R. G. Spallek, Eds., vol. 4934 of Lecture Notes in Computer Science, pp. 188–201, Springer, 2008.
  16. A. Klimm, O. Sander, and J. Becker, “A microblaze specific co-processor for real-time hyperelliptic curve cryptography on Xilinx FPGAs,” in Proceedings of the IEEE International Parallel and Distributed Processing Symposium (IPDPS '09), pp. 1–8, IEEE Computer Society, Rome, Italy, 2009. View at Publisher · View at Google Scholar
  17. Atmel Corporation, “Ata5811/5812, uhf ask/fsk transceiver,” 2006.
  18. L. Batina, D. Hwang, A. Hodjat, B. Preneel, and I. Verbauwhede, “Hardware/software co-design for Hyperelliptic Curve Cryptography (HECC) on the 8051 μP,” in Proceedings of the 7th International Workshop on Cryptographic Hardware and Embedded Systems (CHES '05), Lecture Notes in Computer Science, pp. 106–118, September 2005. View at Scopus
  19. H. Cohen, G. Frey, and R. Avanzi, Handbook of Elliptic and Hyperelliptic Curve Cryptography, Chapman & Hall/CRC, Boca Raton, Fla, USA, 2006.
  20. Xilinx, “Picoblaze 8-bit embedded microcontroller user guide,” 2005.
  21. K. Okeya, K. Schmidt-Samoa, C. Spahn, and T. Takagi, “Signed binary representations revisited,” in Proceedings of the 24th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '04), pp. 123–139, Santa Barbara, Calif, USA, 2004.
  22. R. Fan, On the efficiency analysis of wNAF and wMOF, Diploma thesis, September 2005, Supervised by Professor Dr. Tsuyoshi Takagi.
  23. S. K. Jain, L. Song, and K. K. Parhi, “Efficient semisystolic architectures for finite-field arithmetic,” IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 6, no. 1, pp. 101–113, 1998. View at Google Scholar · View at Scopus
  24. M. W. Zuccherato, “An elementary introduction to hyperelliptic curves,” Tech. Rep. CORR 96, University of Waterloo, Ontario, Canada, 1996. View at Google Scholar
  25. P. Engel and G. Hildebrandt, “Die rhythmischen schwankungen der reaktionszeit beim Menschen,” Psychological Research, vol. 32, no. 4, pp. 324–336, 1969. View at Publisher · View at Google Scholar
  26. N. Boston, T. Clancy, Y. Liow, and J. Webster, “Genus two hyperelliptic curve coprocessor,” in Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems, pp. 400–414, Springer, 2002.
  27. A. Klimm, M. Haas, O. Sander, and J. Becker, “A flexible integrated cryptoprocessor for authentication protocols based on hyperelliptic curve cryptography,” in Proceedings of the International Symposium on System-on-Chip (SoC '10), Tampere, Finland, September 2010.
  28. A. Weigl, K.-E. Weiss, C. Schroff et al., “Vehicle security device,” Patent EP0 925 209, 2001, http://www.freepatentsonline.com/EP0925209B1.html.
  29. M. Hirozawa, A. Okamitsu, K. Adachi, and H. Tagawa, “Antivehicle-thief apparatus and code setting method of the apparatus,” Patent EP0 695 675, 1999, http://www.freepatentsonline.com/EP0695675B1.html.
  30. Trusted Computing Group, TPM main specification v1.2.
  31. R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978. View at Publisher · View at Google Scholar · View at Scopus
  32. “National Institute of Standards and Technology (NIST): FIPS-180-2, Secure Hash Standard (SHS),” 2002, http://www.itl.nist.gov/fipspubs.
  33. “RSA Laboratories Inc: RSA Cryptograpy Standard PKCS No.1,” http://www.rsa.com/.
  34. MSDN, “.net framework class library—rsacryptoserviceprovider class,” http://msdn.microsoft.com/en-us/library/system.security.cryptography.
  35. D. L. Evans, K. H. Brown, A. Director, and W. M. Director, “Fips 140-1: security requirements for cryptographic modules,” Category Computer Security, Gaithersburg, Md, USA, 1994.
  36. T. S. Denis, “Libtommath,” http://math.libtomcrypt.com/.
  37. T. S. Denis, “Libtomcrypt,” http://libtomcrypt.com/.
  38. S. Schumacher, “Admins albtraum,” vol. 7, pp. 11–13, 2009, http://grundschutz.info/fileadmin/kundenbereich/Dokumente/Grundschutz 7-2009 11 13.pdf.
  39. S. Schumacher, “Admins albtraum,” vol. 8, pp. 8-9, 2009, http://grundschutz.info/fileadmin/kundenbereich/Dokumente/Grundschutz 8-2009 8 9.pdf.
  40. S. Schumacher, “Admins albtraum,” vol. 10/11, pp. 21-22, 2009.