• DocumentCode
    599408
  • Title

    A scheme for the generation of strong cryptographic key pairs based on ICMetrics

  • Author

    Tahir, R. ; Huosheng Hu ; Dongbing Gu ; McDonald-Maier, K. ; Howells, Gareth

  • Author_Institution
    Sch. of Comput. Sci. & Electron. Eng., Univ. of Essex, Colchester, UK
  • fYear
    2012
  • fDate
    10-12 Dec. 2012
  • Firstpage
    168
  • Lastpage
    174
  • Abstract
    This paper presents a scheme for the generation of strong high entropy keys based on ICMetrics. ICMetrics generates the security attributes of the sensor node based on measurable hardware and software characteristics of the integrated circuit. This work is based on key derivation functions to derive cryptographic key pairs from ICMetrics values. The proposed ICMetrics based key derivation function makes use of ICMetrics basis numbers and authentication tokens from the trusted third party to generate high entropy public/private key pairs. The proposed approach makes use of key stretching using SHA-2 and performs multiple iterations of the proposed key derivation function to generate strong high entropy keys of sufficient length, so as to prevent exhaustive search attacks. The novelty of this work lies in the fact that the entire key generation scheme has been designed keeping in mind the construction principles of ICMetrics, which does not store keys but computes these for every session based on ICMetrics value, therefore use of a random value anywhere in the protocol will compromise the purpose of ICMetrics. The proposed scheme generates high entropy key pairs while concealing the original ICMetrics data, such that it is impossible to recover the ICMetrics basis data in the system.
  • Keywords
    cryptographic protocols; integrated circuits; message authentication; private key cryptography; public key cryptography; sensors; ICMetrics based key derivation function; SHA-2; authentication token; entropy key; integrated circuit metrics; key stretching; measurable hardware characteristics; measurable software characteristics; protocol; public-private key pair; search attack; security attribute; sensor node; strong cryptographic key pair generation; Cryptography; Entropy; Force; Measurement; TV; Hermite Normal Form (HNF); ICMetrics(Integrated Circuit Metrics); Trusted Third Party(TTP); key derivation function; key stretching;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Internet Technology And Secured Transactions, 2012 International Conference for
  • Conference_Location
    London
  • Print_ISBN
    978-1-4673-5325-0
  • Type

    conf

  • Filename
    6470937