New Twdwfewext Document (2)

download New Twdwfewext Document (2)

If you can't read please download the document

description

fwefewfewfvb

Transcript of New Twdwfewext Document (2)

at focus on protecting the communication of vehicles withAfter thgives an optimis of E-safety Ve(EVITA), a project co-funded bycommunication. Moreover, the SHE does not provide all the2) EVITA Project: The objectives of E-safety Vehicle Intrusionmmunication. Moreover, the SHE does not provide all thesecurity features. For those and others reasons, many solutionsavailable today on the market do not make use of this module.at focus on protecting the communication of vehicles withAfter thgives an optimis of E-safety Ve(EVITA), a project co-funded byed to Car to Car (C2C)cotion. Moreover, the SHE does not provide all thesecurity features. For those and others reasons, many solutionsavailable today on the market do not make use of this module.SHE gives an optimized solution limited to Car to Car (C2C)communication. Moreover, the SHE does not provide all thesecurity features. For those and others reasons, many solutionsavailable today on the market do not make use of this module.2) EVITA Project: The objectives of E-safety Vehicle Intrusionis, HIS group developed a hardware module calledapplication ensure different secsecurity features. For those and others reasons, many solutionsavailable today on the market do not make use of this module.2) EVITA Project: The objectives of E-safety Vehicle Intrusionis, HIS group developed a hardware module calledSecure Hardware Extension (SHE), that together with a softwareapplication ensure different security aspects. The SHEwas the ?rst attempt to create a standard solution to solve thesecurity problem in the automotive environment, however theSHE gives an optimized solution limited to Car to Car (C2C)communication. Moreover, the SHE does not provide all thesecurity features. For those and others reasons, many solutionsavailable today on the market do not make use of this module.2) EVITA Project: The objectives of E-safety Vehicle Intrusionis, HIS group developed a hardware module calledapplication ensure different secsecurity features. For those and others reasons, many solutionsavailable today on the market do not make use of this module.2) EVITA Project: The objectives of E-safety Vehicle Intrusionis, HIS group developed a hardware module calledSecure Hardware Extension (SHE), that together with a softwareapplication ensure different security aspects. The SHEwas the ?rst attempt to create a standard solution to solve thesecurity problem in the automotive environment, however the2) EVITA Project: The objectives of E-safety Vehicle IntrusionproTected Application (EVITA), a project co-funded bythe European Commission, are to design, to verify, and to prototypeAfter this, HIS group developed a hardware module calledSecure Hardware Extension (SHE), that together with a softwareapplication ensure different security aspects. The SHEwas the ?rst attempt to create a standard solution to solve thesecurity problem in the automotive environment, however thefrom the vision depth and inertial sensors act in a complementarymanner leading to a more robust recognition outcome comparedwith the situations when each sensor is used individually on itsown. The obtained recognition rates for the single hand gesturesin the Microsoft MSR data set indicate that our fusion approachprovides improved recognition in real-time and under realisticconditions.the outside. Based on the security requirements and theautomotive constraints, they designed a secure on-board architecture,which includes a Hardware Secure Module (HSM),and secure on-board communications protocols. The securityfunctions are partitioned between software and hardware. Theroot of trust is placed in the HSM that should be realised asextension of automotive microcontrollers. As a result of theEVITA analysis, in table II, is shown which algorithms haveto be implemented through the HSM for different levels ofsecurity, compared with the SHE features.The AES cipher is almost identical to the block cipherRijndael [5]. The Rijndael block and key size vary between128, 192 and 256 bits. However, the AES standard only callsfor a block size of 128 bits. Hence, only Rijndael with block length of 128 bits is known as the AES algorithm.AES consists of so-called layers. Each layer manipulates all128 bits of the data path. The data path is also referred as the state of the algorithm. There are only three differenttypes of layers. Each round, with the exception of the ?rst,consists of all three layers as shown in ?gure 1: the plaintedenoted as x, the cipher text as y and the number of roundsas nr, which are 10 for AES-128. Moreover, the last round ndoes not make use of the MixColumn transformation, whichmakes the encryption and decryption scheme symmetric. Eachtransformation is brie?y described below. Key Addition layer: A 128-bit round key, or sub kewhich has been derived from the main key in the keschedule, is XORed to the state. Byte Substitution layer: Each element of the state non-linearly transformed using lookup tables with specialmathematical properties. This introduces confusion to thedata, i.e., it assures that changes in individual state bitspropagate quickly across the data path. ShiftRows layer: it permutes the data on a byte level. MixColumn layer: it is a matrix operation, which combines(mixes) blocks of four bytes.ShiftRows and MixColumn transformations perform diffusionprinciple over all state bits.For each round, Key Addition layer exploits a different sub