Hardware alternatives for crypto authentication

Carregant...
Miniatura
El pots comprar en digital a:
El pots comprar en paper a:

Projectes de recerca

Unitats organitzatives

Número de la revista

Títol de la revista

ISSN de la revista

Títol del volum

Correu electrònic de l'autor

Tribunal avaluador

Realitzat a/amb

Tipus de document

Treball Final de Grau

Condicions d'accés

Accés obert

item.page.rightslicense

Tots els drets reservats. Aquesta obra està protegida pels drets de propietat intel·lectual i industrial corresponents. Sense perjudici de les exempcions legals existents, queda prohibida la seva reproducció, distribució, comunicació pública o transformació sense l'autorització de la persona titular dels drets

Assignatures relacionades

Assignatures relacionades

Publicacions relacionades

Datasets relacionats

Datasets relacionats

Projecte CCD

Abstract

This report presents the reader with an analysis of the different hardware alternatives for crypto authentication available in the market. Aiming to find a device suitable for educational purposes and demonstrating its capabilities, this report can be divided into three sections. The first section, serving as an introduction to cryptography, outlines the various basic concepts defining it. It covers its objectives, the different types of cryptographic systems, as well as the most common attacks they face. Special emphasis is placed on the importance of authentication as a fundamental objective of any cryptographic system seeking to achieve the highest possible level of security. Additionally, a more detailed explanation of the different cryptographic algorithms commonly found in hardware for crypto authentication is provided. The report then proceeds to define the objectives of our market search, providing a historical evolution and future forecast. The different consulted companies and the process of selecting the device are outlined, culminating in the presentation of our choice, the ATECC608A and its development kit, the SOIC XPRO STARTER KIT. Furthermore, a more practical vision of how to use the device is presented. Starting with a detailed explanation of the sign & verify algorithm and how to use it to achieve the desired authentication feature. Subsequently, the practical process of obtaining it using the Atmel Crypto Evaluation Studio program from Microchip is described. Similarly, the process for obtaining authentication with the ATECC608A is developed in Python code, using Microchip's public library, CryptoAuthLib. Finally, various conclusions drawn during the project's execution are presented to the reader. These range from the importance of educating the population on a topic like this, which affects people's privacy, to the impact that technological advancements will have on the field of cryptography and its devices. Failing to keep our cryptographic and privacy solutions up to date could prove fatal to the security of our information.

Descripció

Provinença

Titulació

GRAU EN ENGINYERIA EN TECNOLOGIES INDUSTRIALS (Pla 2010)

Document relacionat

Citació

Ajut

DOI

Versió de l'editor

Altres identificadors

Referències