ALaRI Hang Glider

Search form

Education and Innovation in Embedded Systems Design

USI Università della Svizzera italiana, USI Faculty of Informatics, Advanced Learning and Research Institute USI Università della Svizzera italiana USI Faculty of Informatics USI Advanced Learning and Research Institute
TitleChallenges in designing trustworthy cryptographic co-processors
Publication TypeConference Paper
Year of Publication2015
AuthorsRegazzoni, F., R. Graves, G. Di Natale, L. Batina, S. Bhasin, B. Ege, A. P. Fournaris, N. Mentens, S. Picek, V. Rozic, N. Sklavos, and B. Yang
Conference NameIEEE International Symposium on Circuits and Systems (ISCAS) 2015
Date Published09/2015
PublisherIEEE
Conference LocationLisbon, Portugal
Accession Number15343469
Keywordsasymmetrical cryptographic primitives, cryptography, hardware Trojan detection techniques
Abstract

Security is becoming ubiquitous in our society. However, the vulnerability of electronic devices that implement the needed cryptographic primitives has become a major issue. This paper starts by presenting a comprehensive overview of the existing attacks to cryptography implementations. Thereafter, the state-of-the-art on some of the most critical aspects of designing cryptographic co-processors are presented. This analysis starts by considering the design of asymmetrical and symmetrical cryptographic primitives, followed by the discussion on the design and online testing of True Random Number Generation. To conclude, techniques for the detection of Hardware Trojans are also discussed

URLhttp://dx.doi.org/10.1109/ISCAS.2015.7169070
DOI10.1109/ISCAS.2015.7169070