Hardware Security Module Cryptosystem Using Petri Net
نویسندگان
چکیده
An embedded system is a combination of hardware and software designed to perform specific functions. It consists SoCs (system on chip) that it relies do its computing work. A key feature an consumes less power components occupy space the IC (integrated circuit) thus, use SoCs. Embedded manufacturers get these from third-party companies reduce their time market. That would increase possibility systems be compromised. In this paper, we present novel approach securing such critical systems. For that, made Hardware Security Module (HSM), which secure SoC with encrypt/decrypt engine Petri net for algorithm modulation data flow. We ensure uses genuine firmware secured since algorithms only known manufacturers.
منابع مشابه
Hardware Accelerators for Petri - net Analysis
| F or reachability analysis of Petri-nets an FPGA-based accelerator is proposed. Since the simple components of Petri-nets can be easily realized in high-density FPGAs, the complete problem can be mapped to silicon providing a solution environment faster than the traditional software-based simulators. Some classes of Petri-nets support the compositional analysis, this way the limited capacity ...
متن کاملTime Petri Net Unfoldings and Hardware Veriication
Real-time applications require hardware components to be predictable in terms of their temporal characteristics. For this reason synchronous (clocked) circuits have traditionally been used in real-time systems. With the advent of submicron technologies the role of asynchronous techniques in designing hardware platforms for real-time systems will dramatically increase. Yet the lack of eecient fo...
متن کاملA Public-Key Cryptosystem Based On Stochastic Petri Net
In this paper, we present a new method to build public-key Cryptosystem. The method is based on the state explosion problem occurred in the computing of average number of tokens in the places of Stochastic Petri Net (SPN). The reachable markings in the coverability tree of SPN are used as the encryption keys. Accordingly, multiple encryption keys can be generated, thus we can perform multiple e...
متن کاملFormal approach on modeling and predicting of software system security: Stochastic petri net
To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...
متن کاملPetri Net Security Checker: Structural Non-interference at Work
Structural non-interference is a semi-static technique defined over Petri nets to check the absence of illegal information flows. This paper presents the main algorithmic features of this new technique and its implementation in a software tool, called the Petri Net Security Checker.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indonesian Journal of Electrical Engineering and Informatics
سال: 2023
ISSN: ['2089-3272']
DOI: https://doi.org/10.52549/ijeei.v11i2.4264