2010 | OriginalPaper | Buchkapitel
Hardware Intrinsic Security
verfasst von : Pim Tuyls
Erschienen in: Radio Frequency Identification: Security and Privacy Issues
Verlag: Springer Berlin Heidelberg
Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.
Wählen Sie Textabschnitte aus um mit Künstlicher Intelligenz passenden Patente zu finden. powered by
Markieren Sie Textabschnitte, um KI-gestützt weitere passende Inhalte zu finden. powered by
Counterfeiting of electronic goods and stealing of valuable and sensitive data has become a massive problem for companies, the economy and even the security of modern societies. In order to deal with these issues more and more security measures have to be put in place both at the system level as well as the device level. Since security solutions are only as strong as their weakest link, strong solutions can only build on strong foundations. It is widely accepted that secure hardware is a fundamental building block of a strong solution. In this talk we will introduce secure hardware technologies built on the intrinsic physical properties of the underlying device: Hardware Intrinsic Security. We will start by introducing the physical principles behind this concept. Next, we continue with the cryptographic primitives and the applications which can build upon these intrinsic hardware security foundations. These will be illustrated with some practical examples. Finally, we discuss existing challenges and new directions.