Cryptographic Processors-A Survey
Autor: | Jolyon Clulow, Ross Anderson, Sergei Skorobogatov, Mike Bond |
---|---|
Rok vydání: | 2006 |
Předmět: | |
Zdroj: | Proceedings of the IEEE. 94:357-369 |
ISSN: | 1558-2256 0018-9219 |
DOI: | 10.1109/jproc.2005.862423 |
Popis: | Tamper-resistant cryptographic processors are becoming the standard way to enforce data-usage policies. Their origins lie with military cipher machines and PIN processing in banking payment networks, expanding in the 1990s into embedded applications: token vending machines for prepayment electricity and mobile phone credit. Major applications such as GSM mobile phone identification and pay TV set-top boxes have pushed low-cost cryptoprocessors toward ubiquity. In the last five years, dedicated crypto chips have been embedded in devices such as game console accessories and printer ink cartridges, to control product and accessory after markets. The "Trusted Computing" initiative will soon embed cryptoprocessors in PCs so they can identify each other remotely. This paper surveys the range of applications of tamper-resistant hardware and the array of attack and defense mechanisms which have evolved in the tamper-resistance arms race. |
Databáze: | OpenAIRE |
Externí odkaz: |