Hardware Security Primitives

Highly embedded devices, like RFID chips and low-cost sensor nodes, are typically subject to strict resource constraints that prevent the deployment of standard security hardware. Hence, these systems are subject to hardware and side channel attacks. We will investigate intrinsic and unique physical properties of hardware for building a cost-effective and lightweight trust anchor in hardware. In this context, Physically Unclonable Functions (PUFs) will be considered for integration into cryptographic schemes and security protocols to establish trust in a remote embedded device by assuring that the device is in the desired hardware and software state. Moreover, we will explore lightweight cryptography and security protocols specifically designed for mobile embedded system environments, focusing on privacy-preserving solutions.