Tahir, Ruhma and Hu, Huosheng and Gu, Dongbing and McDonald-Maier, Klaus and Howells, Gareth (2013) A scheme for the generation of strong cryptographic key pairs based on ICMetrics. In: 2012 International Conference for Internet Technology and Secured Transactions, 2012-12-10 - 2012-12-12, London.
Tahir, Ruhma and Hu, Huosheng and Gu, Dongbing and McDonald-Maier, Klaus and Howells, Gareth (2013) A scheme for the generation of strong cryptographic key pairs based on ICMetrics. In: 2012 International Conference for Internet Technology and Secured Transactions, 2012-12-10 - 2012-12-12, London.
Tahir, Ruhma and Hu, Huosheng and Gu, Dongbing and McDonald-Maier, Klaus and Howells, Gareth (2013) A scheme for the generation of strong cryptographic key pairs based on ICMetrics. In: 2012 International Conference for Internet Technology and Secured Transactions, 2012-12-10 - 2012-12-12, London.
Abstract
This paper presents a scheme for the generation of strong high entropy keys based on ICMetrics. ICMetrics generates the security attributes of the sensor node based on measurable hardware and software characteristics of the integrated circuit. This work is based on key derivation functions to derive cryptographic key pairs from ICMetrics values. The proposed ICMetrics based key derivation function makes use of ICMetrics basis numbers and authentication tokens from the trusted third party to generate high entropy public/private key pairs. The proposed approach makes use of key stretching using SHA-2 and performs multiple iterations of the proposed key derivation function to generate strong high entropy keys of sufficient length, so as to prevent exhaustive search attacks. The novelty of this work lies in the fact that the entire key generation scheme has been designed keeping in mind the construction principles of ICMetrics, which does not store keys but computes these for every session based on ICMetrics value, therefore use of a random value anywhere in the protocol will compromise the purpose of ICMetrics. The proposed scheme generates high entropy key pairs while concealing the original ICMetrics data, such that it is impossible to recover the ICMetrics basis data in the system. © 2012 Infonomics Society.
Item Type: | Conference or Workshop Item (Paper) |
---|---|
Additional Information: | Published proceedings: 2012 International Conference for Internet Technology and Secured Transactions, ICITST 2012 |
Uncontrolled Keywords: | ICMetrics(lntegrated Circuit Metrics); Hermite Normal Form (HNF); Trusted Third Party(TTP); key stretching; key derivation function |
Divisions: | Faculty of Science and Health Faculty of Science and Health > Computer Science and Electronic Engineering, School of |
SWORD Depositor: | Unnamed user with email elements@essex.ac.uk |
Depositing User: | Unnamed user with email elements@essex.ac.uk |
Date Deposited: | 22 Jul 2020 07:25 |
Last Modified: | 30 Oct 2024 16:53 |
URI: | http://repository.essex.ac.uk/id/eprint/28235 |
Available files
Filename: A scheme for the Generation Accepted.pdf