*Methods and Mechanisms for Securing Cryptographic Assets in Embedded Devices
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F68407700%3A21230%2F15%3A00238786" target="_blank" >RIV/68407700:21230/15:00238786 - isvavai.cz</a>
Výsledek na webu
—
DOI - Digital Object Identifier
—
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
*Methods and Mechanisms for Securing Cryptographic Assets in Embedded Devices
Popis výsledku v původním jazyce
*This document is the second deliverable in the contracted Student Research Project focusing on security of cryptographic assets in embedded systems, as part of the Electrolux Student Support Program at Czech Technical University in Prague. The documentcovers the area of cryptographic assets (i.e. cryptographic keys, certificates, passwords) and methods and mechanisms for their protection, with special focus on various secure storage approaches and on analysis of their strengths and weaknesses with respect to limitations imposed by embedded systems. Different attacks against cryptographic assets are described and classified, including analysis of their impact. Lifecycle of cryptographic assets and related issues, and implications towards general system security, are also included. Additionally, a short section is devoted to consideration of what kind of cryptographic assets and in which form should be stored on-device during manufacture to allow secure identification and establishment
Název v anglickém jazyce
*Methods and Mechanisms for Securing Cryptographic Assets in Embedded Devices
Popis výsledku anglicky
*This document is the second deliverable in the contracted Student Research Project focusing on security of cryptographic assets in embedded systems, as part of the Electrolux Student Support Program at Czech Technical University in Prague. The documentcovers the area of cryptographic assets (i.e. cryptographic keys, certificates, passwords) and methods and mechanisms for their protection, with special focus on various secure storage approaches and on analysis of their strengths and weaknesses with respect to limitations imposed by embedded systems. Different attacks against cryptographic assets are described and classified, including analysis of their impact. Lifecycle of cryptographic assets and related issues, and implications towards general system security, are also included. Additionally, a short section is devoted to consideration of what kind of cryptographic assets and in which form should be stored on-device during manufacture to allow secure identification and establishment
Klasifikace
Druh
V<sub>souhrn</sub> - Souhrnná výzkumná zpráva
CEP obor
IN - Informatika
OECD FORD obor
—
Návaznosti výsledku
Projekt
—
Návaznosti
N - Vyzkumna aktivita podporovana z neverejnych zdroju
Ostatní
Rok uplatnění
2015
Kód důvěrnosti údajů
C - Předmět řešení projektu podléhá obchodnímu tajemství (§ 504 Občanského zákoníku), ale název projektu, cíle projektu a u ukončeného nebo zastaveného projektu zhodnocení výsledku řešení projektu (údaje P03, P04, P15, P19, P29, PN8) dodané do CEP, jsou upraveny tak, aby byly zveřejnitelné.
Údaje specifické pro druh výsledku
Počet stran výsledku
79
Místo vydání
—
Název nakladatele resp. objednatele
Electrolux Italia S.p.A
Verze
—