Global Sources
EE Times-India
Stay in touch with EE Times India
EE Times-India > Embedded

Use cryptography to secure authentication, Part 2

Posted: 29 May 2009     Print Version  Bookmark and Share

Keywords:crypto-key  cloner  microprocessor firmware 

If the attacker doesn't know the algorithm, then implementing a brute force attack is impossible since the attacker can't compute the output even if he knows the key. Systems like this were the historical norm until very recently.

This is still a reasonable strategy in some situations, especially where there is a limit on the complexity of the encryption hardware (perhaps for cost or power consumption reasons) and/or insufficient key storage mechanism.

Good examples of this situation would be RFID tags which cannot consume much current nor cost more than the value they protect, perhaps a single trip on a subway.

Nonetheless, such systems are being used less and less in favour of systems constructed from widely studied open algorithms. This has been made possible by advances in semiconductor technology that permit logic gates to cost less and consume less power at the same time.

This article discusses various authentication solutions to protect against cloning, fraudulent modification, secret disclosure or other types of misuse.

View the PDF document for more information.

Read Part 1 of this article here.

Comment on "Use cryptography to secure authentic..."
*  You can enter [0] more charecters.
*Verify code:


Visit Asia Webinars to learn about the latest in technology and get practical design tips.


Go to top             Connect on Facebook      Follow us on Twitter      Follow us on Orkut

Back to Top