Cryptographic randomness on a CC2538: a case study

Yan Yan, Elisabeth Oswald, Theo Tryfonas

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

2 Citations (Scopus)

Abstract

Smart metering, smart parking, health, environment monitoring, and other applications drive the deployment of the so-called Internet of Things (IoT). Whilst cost and energy efficiency are the main factors that contribute to the popularity of commercial devices in the IoT domain, security features are increasingly desired. Security features typically guarantee authenticity of devices and/or data, as well as confidentiality of data in transit. Our study finds that whilst cryptographic algorithms for confidentiality and authenticity are supported in hardware on a popular class of devices, there is no adequate support for random number generation available. We show how to non-invasive manipulate the on-board source for randomness, and thereby we can completely undermine the security provided by (otherwise) strong cryptographic algorithms, with devastating results.

Original languageEnglish
Title of host publication8th IEEE International Workshop on Information Forensics and Security, WIFS 2016
Subtitle of host publicationProceedings of a meeting held 4-7 December 2016, Abu Dhabi, United Arab Emirates.
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Number of pages6
ISBN (Electronic)9781509011384
DOIs
Publication statusPublished - Mar 2017
Event8th IEEE International Workshop on Information Forensics and Security, WIFS 2016 - Abu Dhabi, United Arab Emirates
Duration: 4 Dec 20167 Dec 2016

Publication series

NameInternational Workshops on Information Forensics and Security
ISSN (Electronic)2157-4774

Conference

Conference8th IEEE International Workshop on Information Forensics and Security, WIFS 2016
CountryUnited Arab Emirates
CityAbu Dhabi
Period4/12/167/12/16

Fingerprint Dive into the research topics of 'Cryptographic randomness on a CC2538: a case study'. Together they form a unique fingerprint.

Cite this