A security scheme for dependable key insertion in mobile embedded devices

  • Authors:
  • Alexander Klimm;Benjamin Glas;Matthias Wachs;Sebastian Vogel;Klaus D. Müller-Glaser;Jürgen Becker

  • Affiliations:
  • Institute for Information Processing Technology, Karlsruhe Institute of Technology, Karlsruhe, Germany;Institute for Information Processing Technology, Karlsruhe Institute of Technology, Karlsruhe, Germany;Institute for Information Processing Technology, Karlsruhe Institute of Technology, Karlsruhe, Germany;Institute for Information Processing Technology, Karlsruhe Institute of Technology, Karlsruhe, Germany;Institute for Information Processing Technology, Karlsruhe Institute of Technology, Karlsruhe, Germany;Institute for Information Processing Technology, Karlsruhe Institute of Technology, Karlsruhe, Germany

  • Venue:
  • International Journal of Reconfigurable Computing - Special issue on selected papers from the international workshop on reconfigurable communication-centric systems on chips (ReCoSoC' 2010)
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Public Key Cryptography enables entity authentication protocols based on a platform's knowledge of other platforms' public key. This is particularly advantageous for embedded systems, such as FPGA platforms, with limited or none read-protected memory resources. For access control systems, an access token is authenticated by the mobile system. Only the public key of authorized tokens needs to be stored inside the mobile platform. At some point during the platform's lifetime, these might need to be updated in the field due to loss or damage of tokens. This paper proposes a holistic approach for an automotive access control system based on Public Key Cryptography. Next to a FPGA-based hardware architecture, we focus on a secure scheme for key flashing of public keys to highly mobile systems. The main goal of the proposed scheme is the minimization of online dependencies to Trusted Third Parties, Certification Authorities, or the like, to enable key flashing in remote locations with only minor technical infrastructure. Introducing trusted mediator devices, new tokens can be authorized and later their public key can be flashed into a mobile system on demand.