datasheets.com EBN.com EDN.com EETimes.com Embedded.com PlanetAnalog.com TechOnline.com  
Events
UBM Tech
UBM Tech
Welcome Guest Log In | Register

Cryptographic Ignition Keys: Implementation Methodology and Guidance

Authored on: Apr 26, 2012

Technical Paper

0 0
More InfoLess Info
This white paper examines a proven physical security and critical security parameter protection scheme often referred to as cryptographic ignition key or CIK. CIK technology is a tool that allows a device designer to protect the information processed by their device, including both data in flight and data at rest. In a lot of ways a CIK just like a set of keys. Lock the doors, take the keys with you, and for the most part, the car is secure. However, implementing a CIK properly can be more like locking the doors and taking the keys, engine, transmission, and wheels with you.

Please disable any pop-up blockers for proper viewing of this paper.

0 comments
write a comment

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page