Bus encryption

Bus encryption

Bus encryption is the use of encrypted program instructions on a data bus in a computer that includes a secure cryptoprocessor for executing the encrypted instructions. Bus encryption is used primarily in electronic systems that require high security, such as Automated teller machines, TV set-top boxes, and secure data communication devices such as digital police radios.

Bus encryption can also mean encrypted data transmission on a data bus from one processor to another processor. For example from the CPU to a GPU, which does not require input of encrypted instructions. Such bus encryption is used by the Microsoft operating system Vista to protect certificates, BIOS, passwords, and program authenticity. PVP-UAB (Protected Video Path) provides bus encryption of premium video content in PCs as it passes over the PCIe bus to graphics cards [ [http://technet2.microsoft.com/WindowsVista/en/library/ba1a3800-ce29-4f09-89ef-65bce923cdb51033.mspx?mfr=true Encryption in Microsoft Windows Vista] ] to enforce Digital rights management.

The need for bus encryption arises when countless technicians have access to internal circuitry of electronic systems, either because they service and repair such systems, stock spare components for the systems, own the system, steal the system, or find a lost or abandoned system, under battlefield conditions for example. It is not only necessary to prevent tampering of encrypted instructions that may be easily discovered on a data bus or during data transmission, but also to prevent discovery of decrypted instructions that may reveal security weaknesses that an intruder can exploit.

In TV set-top boxes, it is necessary to download program instructions periodically to customer's units, to provide new features and to fix bugs. These new instructions are encrypted before transmission to set-top boxes, but must also remain secure on data buses and during execution. This can be accomplished by secure cryptoprocessors that read encrypted instructions on the data bus from external data memory, decrypt the instructions in the cryptoprocessor, and execute the instructions in the same cryptoprocessor.

ee also

Copy protection

Notes

References

* R. Elbaz, et al, Hardware Engines for Bus Encryption — A Survey, 2005. [http://date.eda-online.co.uk/proceedings/papers/2005/date05/df_files/02d_1.pdf (PDF)] .
* Robert M. Best, US Patent [http://patft1.uspto.gov/netacgi/nph-Parser?patentnumber=4278837 4,278,837] , July 14, 1981


Wikimedia Foundation. 2010.

Игры ⚽ Нужно сделать НИР?

Look at other dictionaries:

  • Array controller based encryption — Within a storage network, encryption of data may occur at different hardware levels. Array controller based encryption describes the encryption of data occurring at the disk array controller before being sent to the disk drives. This article will …   Wikipedia

  • Disk encryption — uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume. Disk encryption prevents unauthorized access to data storage. The term full disk encryption (or whole disk encryption) is often used to… …   Wikipedia

  • Secure cryptoprocessor — A secure cryptoprocessor is a dedicated computer on a chip or microprocessor for carrying out cryptographic operations, embedded in a packaging with multiple physical security measures, which give it a degree of tamper resistance. The purpose of… …   Wikipedia

  • Copy protection — Copy protection, also known as content protection, copy obstruction, copy prevention and copy restriction, refer to techniques used for preventing the reproduction of software, films, music, and other media, usually for copyright reasons.[1]… …   Wikipedia

  • Software protection dongle — This article is about the software protection devices. Dongle can also refer to, e.g., serial ports, USB flash drives, wireless networking devices, USB Mobile broadband modems. Daisy chained parallel port copy protection dongles. A software… …   Wikipedia

  • Dongle — A dongle is a small piece of hardware that connects to a computer. [Late 20th century. Origin uncertain: probably an arbitrary formation. Microsoft Encarta Premium Suite 2004.] The usual function of a dongle is to authenticate a piece of software …   Wikipedia

  • Abkürzungen/Computer — Dies ist eine Liste technischer Abkürzungen, die im IT Bereich verwendet werden. A [nach oben] AA Antialiasing AAA authentication, authorization and accounting, siehe Triple A System AAC Advanced Audio Coding AACS …   Deutsch Wikipedia

  • Liste der Abkürzungen (Computer) — Dies ist eine Liste technischer Abkürzungen, die im IT Bereich verwendet werden. A [nach oben] AA Antialiasing AAA authentication, authorization and accounting, siehe Triple A System AAC Advanced Audio Coding AACS …   Deutsch Wikipedia

  • Cisco PIX — PIX 535 Firewall Cisco PIX (Private Internet eXchange) is a popular IP firewall and network address translation (NAT) appliance. It was one of the first products in this market segment. In 2005, Cisco introduced the newer Adaptive Security… …   Wikipedia

  • Wireless USB specification — Certified Wireless USB (W USB for short) is the specification of a wireless extension of the USB standard which intends to further increase the availability of general USB based solutions. It is maintained by the WiMedia Alliance, and as of 2007… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”