Normalizing Discrete Circuit Features with Statistically Independent values for incorporation within a highly Secure Encryption System

Protecting hardware devices from unwanted software attacks is a current area of major security concern. Coupled with the need to secure and verify data sent to and from such devices, the need to supply systems capable of uniquely identifying and securing hardware devices is considerable and imminent. This paper introduces techniques which possess the potential to generate unique identifying codes for given hardware devices based on measurable quantities or features associated with the given hardware and software configurations executing upon it. The techniques are investigated by considering abstract properties in order to validate primarily the feature normalization techniques employed prior to the code generation phase which allows features with highly variable distributions, and whose component values are independent of each other, to be employed within the code generation system.

[1]  B. Chen,et al.  Biometric Based Cryptographic Key Generation from Faces , 2007, 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications (DICTA 2007).

[2]  Andy Adler,et al.  Vulnerabilities in Biometric Encryption Systems , 2005, AVBPA.

[3]  Keinosuke Fukunaga,et al.  Introduction to Statistical Pattern Recognition , 1972 .

[4]  Kohji Fukunaga,et al.  Introduction to Statistical Pattern Recognition-Second Edition , 1990 .

[5]  Hao Feng,et al.  Private key generation from on-line handwritten signatures , 2002, Inf. Manag. Comput. Secur..

[6]  W. Gareth J. Howells,et al.  Novel Techniques for Ensuring Secure Communications for Distributed Low Power Devices , 2006, First NASA/ESA Conference on Adaptive Hardware and Systems (AHS'06).

[7]  Peter M. Fenwick Variable-length integer codes based on the Goldbach conjecture, and other additive codes , 2002, IEEE Trans. Inf. Theory.

[8]  Erfu Yang,et al.  Intelligent and Distributed Reconfigurable System-on-Chip Sensor Networks for Space Applications - An Introduction to ESPACENET , 2006 .

[9]  David Wheeler Protocols Using Keys from Faulty Data , 2001, Security Protocols Workshop.

[10]  Erfu Yang,et al.  ESPACENET: A Joint Project for Evolvable and Reconfigurable Sensor Networks for Application to Aerospace-Based Monitoring and Diagnosis , 2006 .

[11]  Brian D. Ripley,et al.  Pattern Recognition and Neural Networks , 1996 .

[12]  Erfu Yang,et al.  ESPACENET: A Framework of Evolvable and Reconfigurable Sensor Networks for Aerospace–Based Monitoring and Diagnostics , 2006, First NASA/ESA Conference on Adaptive Hardware and Systems (AHS'06).

[13]  Randall K. Nichols ICSA guide to cryptography , 1998 .