Hardware alternatives for crypto authentication
Títol de la revista
ISSN de la revista
Títol del volum
Correu electrònic de l'autor
Tutor / director
Tribunal avaluador
Realitzat a/amb
Tipus de document
Data
Condicions d'accés
item.page.rightslicense
Publicacions relacionades
Datasets relacionats
Projecte CCD
Abstract
This report presents the reader with an analysis of the different hardware alternatives for crypto authentication available in the market. Aiming to find a device suitable for educational purposes and demonstrating its capabilities, this report can be divided into three sections. The first section, serving as an introduction to cryptography, outlines the various basic concepts defining it. It covers its objectives, the different types of cryptographic systems, as well as the most common attacks they face. Special emphasis is placed on the importance of authentication as a fundamental objective of any cryptographic system seeking to achieve the highest possible level of security. Additionally, a more detailed explanation of the different cryptographic algorithms commonly found in hardware for crypto authentication is provided. The report then proceeds to define the objectives of our market search, providing a historical evolution and future forecast. The different consulted companies and the process of selecting the device are outlined, culminating in the presentation of our choice, the ATECC608A and its development kit, the SOIC XPRO STARTER KIT. Furthermore, a more practical vision of how to use the device is presented. Starting with a detailed explanation of the sign & verify algorithm and how to use it to achieve the desired authentication feature. Subsequently, the practical process of obtaining it using the Atmel Crypto Evaluation Studio program from Microchip is described. Similarly, the process for obtaining authentication with the ATECC608A is developed in Python code, using Microchip's public library, CryptoAuthLib. Finally, various conclusions drawn during the project's execution are presented to the reader. These range from the importance of educating the population on a topic like this, which affects people's privacy, to the impact that technological advancements will have on the field of cryptography and its devices. Failing to keep our cryptographic and privacy solutions up to date could prove fatal to the security of our information.

