Demonstrating end point security in embedded systems
This chapter describes a demonstrator for end-point security in a video peripheral. The demonstrator enables a third party to securely display a message, stored on a compact flash card, on a video monitor attached to the system. The message is personalized to a specific instance of the display platform and cannot be copied, modified, or cloned. The message is only decoded just before rendering the message on the video display. The chapter describes architectural enhancements to hardware and software to implement end-point security. The resulting system effectively implements a secure ’tunnel’: a trusted path from the compact flash memory up to the pins of the VGA connector. The chapter also presents a suitable security protocol to support end-point security services, and it presents a design methodology to implement this concept.
KeywordsAdvance Encryption Standard Stream Cipher Online Phase Video Messaging Secure Video
- 1.A. Bylund, “Apple’s DRM cracked again,” http://arstechnica.com/news.ars/post/20060830–7619.html, 2006.
- 2.A. Huang, “Keeping secrets in hardware: the Microsoft Xbox (TM) case study,” Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems 2002 (CHES 2002), 13–15.Google Scholar
- 3.E. Charbon, I. Tounoglu, “On intellectual property protection,” Proceedings 2001 IEEE Custom Integrated Circuits Conference, 517–523.Google Scholar
- 4.W. Shi, H. S. Lee, R. M. Yoo, A. Boldyreva, “A digital rights enabled graphics processing system,” Proceedings of the 21st ACM SIGGRAPH symposium on Graphics Hardware, 2006.Google Scholar
- 7.R. Anderson, “Security engineering,” Wiley, 2001.Google Scholar
- 8.E. Gallery, “An overview of trusted computing technology,” in C. Mitchell, editor, “Trusted Computing,” IEE Professional Applications of Computing Series, 2005, IEE Press.Google Scholar
- 9.E. Simpson, P. Schaumont, “Offline hardware/software authentication for reconfigurable platforms,” Proceedings of Cryptographic Hardware and Embedded Systems Workshop (CHES 2006), 311–323.Google Scholar
- 10.C. D. Canniere, B. Preneel, “Trivium Specifications,” ECRYPT eStream Phase 3, 2006.Google Scholar
- 11.GEZEL Homepage, http://rijndael.ece.vt.edu/gezel2