Generation of the Secret Encryption Key Using the Signature of the Embedded System
DOI:
https://doi.org/10.5755/j01.itc.41.4.1162Keywords:
embedded system, program security, secret key, hash function, entropyAbstract
Program protection, programming code integrity and intellectual property protection are important problems in embedded systems. Security mechanisms for embedded systems have some specific restrictions related to limited resources, bandwidth requirements and security. In this paper we develop a secret encryption key generation algorithm by using the signature of the embedded system. We explore the qualitative characteristic of the generated keys - the entropy. Experiments showed that the generated secret keys have high entropy.Downloads
Published
2012-10-30
Issue
Section
Articles
License
Copyright terms are indicated in the Republic of Lithuania Law on Copyright and Related Rights, Articles 4-37.