Generation of the Secret Encryption Key Using the Signature of the Embedded System

Algimantas Venčkauskas, Nerijus Jusas, Irena Mikuckienė, Stasys Maciulevičius


Program protection, programming code integrity and intellectual property protection are important problems in embedded systems. Security mechanisms for embedded systems have some specific restrictions related to limited resources, bandwidth requirements and security. In this paper we develop a secret encryption key generation algorithm by using the signature of the embedded system. We explore the qualitative characteristic of the generated keys - the entropy. Experiments showed that the generated secret keys have high entropy.



embedded system; program security; secret key; hash function; entropy

Full Text: PDF

Print ISSN: 1392-124X 
Online ISSN: 2335-884X