Design of a novel USB crypto bridge device

Information technologies have emerging use of portable drives. Hence, the readability and security of the content is at great risk in the event that it is lost or stolen. An effective solution to this issue is the use of removable disks in encrypted form. In this paper, a novel USB device that has cryptobridge capability is proposed.

Design of a novel USB crypto bridge device

Information technologies have emerging use of portable drives. Hence, the readability and security of the content is at great risk in the event that it is lost or stolen. An effective solution to this issue is the use of removable disks in encrypted form. In this paper, a novel USB device that has cryptobridge capability is proposed.

___

  • data is reduced. Moreover, there are several security features that make the proposed device safer to use. The
  • problem of security in data transfer with a low data cost per gigabyte is a hot topic for novel devices. Therefore,
  • the proposed device is a secure and low-cost solution for these problems.
  • T. Liu, H. Zhu, “An ID-based multi-server authentication with key agreement scheme without verification table on elliptic curve cryptosystem”, International Conference on Computational Aspects of Social Networks Proceedings, pp. 61–64, 2010.
  • M. Matsui, “Cryptography in embedded environments”, IEEE 13th International Symposium on Consumer Elec- tronics, pp. 16–17, 2009.
  • C.L. Chen, “A secure and traceable E-DRM system based on mobile device”, Expert Systems with Applications,
  • Vol. 35, pp. 878–886, 2008.
  • C. Hessel, “Passive protection against security compromise or possible insecurity when information/communications devices are lost”, IEEE Military Communications Conference, Vol. 2, pp. 758–760, 2003.
  • Y. Zhou, S. Guo, “SPA-based security evaluation of RSA implementation in Internet banking USB token”, In- ternational Conference on Instrumentation, Measurement, Computer, Communication and Control, pp. 499–503, 2011.
  • A. Falcone, R. Focardi, “Formal analysis of key integrity in PKCS#11”, Automated Reasoning for Security Protocol
  • Analysis and Issues in the Theory of Security, Joint Workshop, pp. 77–94, 2010 .
  • L. Han, J. Liu, D. Zhang, Z. Han, X. Wei, “A portable TPM scheme for general-purpose trusted computing based on EFI”, International Conference on Multimedia Information Networking and Security, Vol. 1, pp. 140–143, 2009.
  • G. Lomako, I.P. Park, S. Johnson, D. Braun, K. Guo, “Cryptographic consumer electronic devices file systems performance”, IEEE Consumer Communications and Networking Conference , Vol. 2, pp. 1303–1304, 2006.
  • AES Technical Standard, available at http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.
  • Turkish Standards Institution Common Criteria Certification Scheme: USBK Cryptobridge v 2.0 for Model A101
  • and Model A103, available at http://www.commoncriteriaportal.org/products/.
Turkish Journal of Electrical Engineering and Computer Science-Cover
  • ISSN: 1300-0632
  • Yayın Aralığı: Yılda 6 Sayı
  • Yayıncı: TÜBİTAK