Improving "Trusting the Edge" Through Cryptographic Key Hiding

Award Information
Agency: Department of Defense
Branch: Air Force
Contract: FA8650-07-M-8131
Agency Tracking Number: O063-I13-1120
Amount: $99,593.00
Phase: Phase I
Program: SBIR
Awards Year: 2007
Solicitation Year: 2006
Solicitation Topic Code: OSD06-I13
Solicitation Number: 2006.3
Small Business Information
3000 Kent Avenue, Purdue Technology Center, West Lafayette, IN, 47906
DUNS: 149171303
HUBZone Owned: N
Woman Owned: N
Socially and Economically Disadvantaged: N
Principal Investigator
 John Rice
 Principal Investigator
 (765) 775-1004
Business Contact
 John Abernethy
Title: President
Phone: (765) 775-1004
Research Institution
The Security to the Edge strategy identifies a growth area in the development technologies to enable Trusting the Edge; particularly, two research areas are specified: i) hardening an edge node against physical attack; and ii) facilitating the ability of an edge node to monitor and communicate the state of its integrity. The thrust of this proposal is twofold: i) to describe a technique for hiding cryptographic keys in software---including the development of stealthy encryption/decryption techniques; and ii) to build on this capability to implement a challenge/response mechanism for the purposes of i) improving resistance to a class of physical attack (i.e. replay attacks); and ii) interrogating/evaluating an edge node for its status/integrity.

* information listed above is at the time of submission.

Agency Micro-sites

SBA logo
Department of Agriculture logo
Department of Commerce logo
Department of Defense logo
Department of Education logo
Department of Energy logo
Department of Health and Human Services logo
Department of Homeland Security logo
Department of Transportation logo
Environmental Protection Agency logo
National Aeronautics and Space Administration logo
National Science Foundation logo
US Flag An Official Website of the United States Government