Secure Mobile Association and Data Protection with Enhanced Cryptographic Engines
نویسندگان
چکیده
Mobile devices are quickly becoming the most used and abundant electronics used today. The ability to positively identify a mobile device and associate it with a specific person or entity is critical to deter theft and provide enhanced security of stored data. This paper presents a novel method for providing device identification through the use of PUF technology that uniquely labels every supporting device. This method can alo be leveraged to create secure communications between devices and protection of on-board data. Keywords-Trusted Execution Environment, mobile security, physically unclonable functions, AES, authentication, association, cryptographic engines
منابع مشابه
Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملPlatform independent overall security architecture in multi-processor system-on-chip integrated circuits for use in mobile phones and handheld devices
A platform independent security architecture for use in Multi-Processor System-on-Chip integrated circuits, primarily oriented for mobile phones and handheld devices, is presented. The suggested architecture provides an enhanced security protection scheme for use in smartphones, PDA’s, as well as other similar systems. Sensitive data storage facilities, cryptographic engines, and physical prote...
متن کاملBlind Source Separation for digital data protection
Digital transmission is acquiring an ever increasing role in a variety of modern applications. As most of these applications demand data security assurances in order to be accepted by potential users and to be able to produce the desired results, there is an increasing demand for cryptographic techniques capable of providing these assurances. In paradigms like the mobile phone networks or IP ne...
متن کاملEmpowering Mobile Software Agents
Recent work has shown that several cryptographic protocols for the protection of free-roaming mobile agents are vulnerable by means of protocol interleaving attacks. This paper presents equivalent protocols meant to be robust against this type of attack. Moreover, it describes the required processes and data structures at a level of detail that can be translated to an implementation in a straig...
متن کاملCPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking
Authenticated encryption schemes are important cryptographic primitives that received extensive attention recently. They can provide both confidentiality and authenticity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, similar to the any physical implementation of any other cryptographic scheme. In this paper, a three-step CPA attack against...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013