Skip to main content

A Scheme for the Generation of Strong Cryptographic Key Pairs based on ICMetrics

Tahir, Ruhma and Hu, Huosheng and Gu, Dongbing and McDonald-Maier, Klaus and Howells, Gareth (2012) A Scheme for the Generation of Strong Cryptographic Key Pairs based on ICMetrics. In: 2012 International Conference for Internet Technology and Secured Transactions. IEEE. ISBN 978-1-4673-5325-0. E-ISBN 978-1-908320-08-7. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided. (Contact us about this Publication)

Abstract

This paper presents a scheme for the generation of strong high entropy keys based on ICMetrics. ICMetrics generates the security attributes of the sensor node based on measurable hardware and software characteristics of the integrated circuit. This work is based on key derivation functions to derive cryptographic key pairs from ICMetrics values. The proposed ICMetrics based key derivation function makes use of ICMetrics basis numbers and authentication tokens from the trusted third party to generate high entropy public/private key pairs. The proposed approach makes use of key stretching using SHA-2 and performs multiple iterations of the proposed key derivation function to generate strong high entropy keys of sufficient length, so as to prevent exhaustive search attacks. The novelty of this work lies in the fact that the entire key generation scheme has been designed keeping in mind the construction principles of ICMetrics, which does not store keys but computes these for every session based on ICMetrics value, therefore use of a random value anywhere in the protocol will compromise the purpose of ICMetrics. The proposed scheme generates high entropy key pairs while concealing the original ICMetrics data, such that it is impossible to recover the ICMetrics basis data in the system.

Item Type: Book section
Uncontrolled keywords: Cryptography, Measurement, Force, Entropy, TV
Subjects: Q Science > QA Mathematics (inc Computing science) > QA 76 Software, computer programming,
T Technology > TK Electrical engineering. Electronics. Nuclear engineering > TK7800 Electronics > TK7880 Applications of electronics > TK7882.P3 Pattern recognition systems
Divisions: Faculties > Sciences > School of Engineering and Digital Arts > Image and Information Engineering
Depositing User: Gareth Howells
Date Deposited: 30 Nov 2016 17:56 UTC
Last Modified: 24 Sep 2019 13:39 UTC
Resource URI: https://kar.kent.ac.uk/id/eprint/59304 (The current URI for this page, for reference purposes)
  • Depositors only (login required):