Protecting Remote Component Authentication

Provided by: IARIA
Topic: Security
Format: PDF
Component authentication allows verifying the genuineness of various components being part of a machine or a system or connected to control equipment. Various technologies are used, ranging from holograms, hidden marks, and special inks to cryptography-based component authentication. Typical cryptography-based mechanisms employ a challenge response-based component authentication mechanism. These mechanisms have been designed originally for a local verification, i.e., for an authentication performed in direct vicinity of the product to be verified. This paper describes an attack on challenge-response component authentication when supporting a remote component authentication and describes a new security measure to prevent this attack.

Find By Topic