You are on page 1of 1

Name Pham Van Khanh Student ID 2020227014

Personal Major Electrical engineering Grade Combine/2nd semester


information 연구방법론
Date 2020/10/21 Class
8th week Information Security Research
Information security, sometimes abbreviated to infosec, is a set of practices intended to keep
data secure from unauthorized access or alterations, both when it’s being stored and when it’s
being transmitted from one machine or physical location to another. You might sometimes see
it referred to as data security. As knowledge has become one of the 21 st century’s most important
assets, efforts to keep information secure have correspondingly become increasingly important.

Nowadays, IoT is rapidly developing and connecting thousands of devices including sensors,
appliances, etc. These devices store a lot of important information and communicate with other
devices. Especially, when data of IoT device transfers from lower layer networks to higher layer
networks, this data may be hacked by external threats. Due to the increase of threats, security is
one of the most concern and needs to be solved with the use of IoT devices. These paradigm
shifts have been raised intensive researches on small-area and low-power hardware
implementation of security system because it must be embedded in compact, low cost and low
power IoT sensor devices. It is difficult to apply the security system of servers or desktops into
sensor devices because of the characteristics of ultra-small size, low power and low cost of these
devices. Besides, the implemented conventional security system is weak due to a shared secret
key between client and server, which implies risky of hacking. Moreover, the key stored in the
memory of IoT devices is limited due to constrained resources, then they are not enough strength
to protect from attacker and they are difficult to analyze or evaluate reliability as well. Therefore,
a new platform to balance cost, power, area, speed and security strength for small-IoT
applications is required. My research will focus on physical unclonable functions (PUF) and
lightweight cryptography (LWC).

PUF is the state-of-the-art method of small area, high entropy source, and only generates key
Summary whenever required in encryption and authentication part of IoT devices, it would help to reduce
much area and memory by operating in physical variation process rather than accumulating key
in memory such as conventional ways. LWC is a part of cryptography and proved performance
advantages over conventional cryptography standards. These methodologies aim to provide
solutions suitable for resource-constrained devices. ISO/IEC 29192 standard specifies
lightweight cryptography algorithms to provide confidentiality, authentication, identification,
non-repudiation, and key exchange for IoT devices. This standard is approved by The
International Organization for Standardization (ISO) and includes a six-part. Among six-part,
part 2 (ISO/IEC 29192-2) specifies lightweight block cipher of encryption and decryption.
PRESENT with a block size of 64-bit and a key size of 80-bit is the smallest block cipher in this
standard. The integration of PUF and LWC solve vulnerabilities and improve reliability
compared to conventional methods.

This invention provides a bidirectional entity authentication hardware SoC that can be applied
to IoT devices based on a physical unclonable function and lightweight cryptography algorithms.
The entity authentication in this invention is based on ISO/IEC 9798-2 standard, which performs
entity authentication mechanisms by using authenticated encryption algorithms. One of the
techniques in this standard is unilaterally authentication one entity to another by using random
numbers and it is also called challenge-response approach. This technique also provides data
integrity of information. The SoC is designed by a proprietary 28 nm CMOS process and verified
by MATLAB Simulink modeling as well as the real chip measurement. The performance results
are expressed in terms of hardware perspective and security perspective. The hardware metrics
show the area occupation, power consumption, latency, and throughput. The security properties
display some security strength metrics such as entropy, avalanche effect, attack scenarios
analysis, and machine learning attack.

You might also like