You are here
Improving "Trusting the Edge" Through Cryptographic Key Hiding
Title: Principal Investigator
Phone: (765) 775-1004
Email: jrice@arxan.com
Title: President
Phone: (765) 775-1004
Email: jabernethy@arxan.com
The Security to the Edge strategy identifies a growth area in the development technologies to enable Trusting the Edge; particularly, two research areas are specified: i) hardening an edge node against physical attack; and ii) facilitating the ability of an edge node to monitor and communicate the state of its integrity. The thrust of this proposal is twofold: i) to describe a technique for hiding cryptographic keys in software---including the development of stealthy encryption/decryption techniques; and ii) to build on this capability to implement a challenge/response mechanism for the purposes of i) improving resistance to a class of physical attack (i.e. replay attacks); and ii) interrogating/evaluating an edge node for its status/integrity.
* Information listed above is at the time of submission. *