Hardware Security Module Cryptosystem Using Petri Net

نویسندگان

چکیده

An embedded system is a combination of hardware and software designed to perform specific functions. It consists SoCs (system on chip) that it relies do its computing work. A key feature an consumes less power components occupy space the IC (integrated circuit) thus, use SoCs. Embedded manufacturers get these from third-party companies reduce their time market. That would increase possibility systems be compromised. In this paper, we present novel approach securing such critical systems. For that, made Hardware Security Module (HSM), which secure SoC with encrypt/decrypt engine Petri net for algorithm modulation data flow. We ensure uses genuine firmware secured since algorithms only known manufacturers.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hardware Accelerators for Petri - net Analysis

| F or reachability analysis of Petri-nets an FPGA-based accelerator is proposed. Since the simple components of Petri-nets can be easily realized in high-density FPGAs, the complete problem can be mapped to silicon providing a solution environment faster than the traditional software-based simulators. Some classes of Petri-nets support the compositional analysis, this way the limited capacity ...

متن کامل

Time Petri Net Unfoldings and Hardware Veriication

Real-time applications require hardware components to be predictable in terms of their temporal characteristics. For this reason synchronous (clocked) circuits have traditionally been used in real-time systems. With the advent of submicron technologies the role of asynchronous techniques in designing hardware platforms for real-time systems will dramatically increase. Yet the lack of eecient fo...

متن کامل

A Public-Key Cryptosystem Based On Stochastic Petri Net

In this paper, we present a new method to build public-key Cryptosystem. The method is based on the state explosion problem occurred in the computing of average number of tokens in the places of Stochastic Petri Net (SPN). The reachable markings in the coverability tree of SPN are used as the encryption keys. Accordingly, multiple encryption keys can be generated, thus we can perform multiple e...

متن کامل

Formal approach on modeling and predicting of software system security: Stochastic petri net

To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...

متن کامل

Petri Net Security Checker: Structural Non-interference at Work

Structural non-interference is a semi-static technique defined over Petri nets to check the absence of illegal information flows. This paper presents the main algorithmic features of this new technique and its implementation in a software tool, called the Petri Net Security Checker.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indonesian Journal of Electrical Engineering and Informatics

سال: 2023

ISSN: ['2089-3272']

DOI: https://doi.org/10.52549/ijeei.v11i2.4264