Home // SECURWARE 2011, The Fifth International Conference on Emerging Security Information, Systems and Technologies // View article


Protecting Remote Component Authentication

Authors:
Rainer Falk
Steffen Fries

Keywords: device authentication, counterfeiting, tunneled authentication

Abstract:
Component authentication allows verifying the genuineness of various components being part of a machine or a system or connected to control equipment. Various technologies are used, ranging from holograms, hidden marks, special inks to cryptography-based component authentication. Typical cryptography-based mechanisms employ a challenge-response-based component authentication mechanism. These mechanisms have been designed originally for a local verification, i.e., for an authentication performed in direct vicinity of the product to be verified. This paper describes an attack on challenge-response component authentication when supporting a remote component authentication and describes a new security measure to prevent this attack.

Pages: 19 to 24

Copyright: Copyright (c) IARIA, 2011

Publication date: August 21, 2011

Published in: conference

ISSN: 2162-2116

ISBN: 978-1-61208-146-5

Location: Nice/Saint Laurent du Var, France

Dates: from August 21, 2011 to August 27, 2011