Generation of the Secret Encryption Key Using the Signature of the Embedded System

Authors

  • Algimantas Venčkauskas Kaunas University of Technology
  • Nerijus Jusas Kaunas University of Technology
  • Irena Mikuckienė Kaunas University of Technology
  • Stasys Maciulevičius Kaunas University of Technology

DOI:

https://doi.org/10.5755/j01.itc.41.4.1162

Keywords:

embedded system, program security, secret key, hash function, entropy

Abstract

Program protection, programming code integrity and intellectual property protection are important problems in embedded systems. Security mechanisms for embedded systems have some specific restrictions related to limited resources, bandwidth requirements and security. In this paper we develop a secret encryption key generation algorithm by using the signature of the embedded system. We explore the qualitative characteristic of the generated keys - the entropy. Experiments showed that the generated secret keys have high entropy.

DOI: http://dx.doi.org/10.5755/j01.itc.41.4.1162

Downloads

Published

2012-10-30

Issue

Section

Articles