Improving "Trusting the Edge" Through Cryptographic Key Hiding
Small Business Information
3000 Kent Avenue, Purdue Technology Center, West Lafayette, IN, 47906
AbstractThe Security to the Edge strategy identifies a growth area in the development technologies to enable Trusting the Edge; particularly, two research areas are specified: i) hardening an edge node against physical attack; and ii) facilitating the ability of an edge node to monitor and communicate the state of its integrity. The thrust of this proposal is twofold: i) to describe a technique for hiding cryptographic keys in software---including the development of stealthy encryption/decryption techniques; and ii) to build on this capability to implement a challenge/response mechanism for the purposes of i) improving resistance to a class of physical attack (i.e. replay attacks); and ii) interrogating/evaluating an edge node for its status/integrity.
* information listed above is at the time of submission.