Locked History Actions

Diff for "Presentation"

Differences between revisions 7 and 8
Revision 7 as of 2021-06-22 08:05:55
Size: 1866
Comment:
Revision 8 as of 2021-06-22 08:07:25
Size: 1924
Comment:
Deletions are marked like this. Additions are marked like this.
Line 13: Line 13:
use it for cryptographic purposes, and a secure element. The root of trust seed relies on a PUF use it for cryptographic purposes, and a secure element. The root of trust seed relies on a Physically Unclonable function (PUF)
Line 15: Line 15:
protection against physical attacks targeting the PUF, and more precisely the FIA. This goal is protection against physical attacks targeting the PUF, and more precisely the Fault Injection Attack (FIA). This goal is

Welcome to the APRIORI project website !

APRIORI is a collaborative research project between Germany BMBF and France ANR

logo_bmbf.png logo_anr.png

APRIORI abstract

APRIORI stands for "Advanced PRivacy of IOT Devices through Robust Hardware Implementations". The APRIORI project addresses the privacy preserving solution in the IoT. It considers a generic IoT architecture for privacy that relies on three important blocks: the “root of trust”, the protocol to use it for cryptographic purposes, and a secure element. The root of trust seed relies on a Physically Unclonable function (PUF) providing a unique and unclonable secret to each IoT device. A first objective is to study the protection against physical attacks targeting the PUF, and more precisely the Fault Injection Attack (FIA). This goal is associated with a deep analysis of FIA impact by using laser or electromagnetic injection sources. A second objective is to study a generic protection against FIA. It is based on an array of digital sensors that would allow protecting not only the PUF but also the associated cryptographic blocks, as the secure element and the processor running sensitive applications. A third objective is to build a protocol to create a robust device identifier relying on a root of trust and on a composition of secure functions at system level. This will enhance the trust in identification and encryption, which are mandatory for secure boot or other sensitive software. A fourth objective is to propose an API for the secure element of the IoT. This API should be studied and designed securely so that no vulnerability can jeopardize the privacy of the IoT.