Artigo Revisado por pares

Cryptographic Processors-A Survey

2006; Institute of Electrical and Electronics Engineers; Volume: 94; Issue: 2 Linguagem: Inglês

10.1109/jproc.2005.862423

ISSN

1558-2256

Autores

Ross Anderson, Mike Bond, Jolyon Clulow, Sergei Skorobogatov,

Tópico(s)

Physical Unclonable Functions (PUFs) and Hardware Security

Resumo

Tamper-resistant cryptographic processors are becoming the standard way to enforce data-usage policies. Their origins lie with military cipher machines and PIN processing in banking payment networks, expanding in the 1990s into embedded applications: token vending machines for prepayment electricity and mobile phone credit. Major applications such as GSM mobile phone identification and pay TV set-top boxes have pushed low-cost cryptoprocessors toward ubiquity. In the last five years, dedicated crypto chips have been embedded in devices such as game console accessories and printer ink cartridges, to control product and accessory after markets. The "Trusted Computing" initiative will soon embed cryptoprocessors in PCs so they can identify each other remotely. This paper surveys the range of applications of tamper-resistant hardware and the array of attack and defense mechanisms which have evolved in the tamper-resistance arms race.

Referência(s)
Altmetric
PlumX