You are here

Improving "Trusting the Edge" Through Cryptographic Key Hiding

Award Information
Agency: Department of Defense
Branch: Air Force
Contract: FA8650-07-M-8131
Agency Tracking Number: O063-I13-1120
Amount: $99,593.00
Phase: Phase I
Program: SBIR
Solicitation Topic Code: OSD06-I13
Solicitation Number: 2006.3
Timeline
Solicitation Year: 2006
Award Year: 2007
Award Start Date (Proposal Award Date): 2007-01-30
Award End Date (Contract End Date): 2008-01-30
Small Business Information
3000 Kent Avenue Purdue Technology Center
West Lafayette, IN 47906
United States
DUNS: 149171303
HUBZone Owned: No
Woman Owned: No
Socially and Economically Disadvantaged: No
Principal Investigator
 John Rice
 Principal Investigator
 (765) 775-1004
 jrice@arxan.com
Business Contact
 John Abernethy
Title: President
Phone: (765) 775-1004
Email: jabernethy@arxan.com
Research Institution
N/A
Abstract

The Security to the Edge strategy identifies a growth area in the development technologies to enable Trusting the Edge; particularly, two research areas are specified: i) hardening an edge node against physical attack; and ii) facilitating the ability of an edge node to monitor and communicate the state of its integrity. The thrust of this proposal is twofold: i) to describe a technique for hiding cryptographic keys in software---including the development of stealthy encryption/decryption techniques; and ii) to build on this capability to implement a challenge/response mechanism for the purposes of i) improving resistance to a class of physical attack (i.e. replay attacks); and ii) interrogating/evaluating an edge node for its status/integrity.

* Information listed above is at the time of submission. *

US Flag An Official Website of the United States Government