An authentication strategy based on spatiotemporal chaos for software copyright protection

作者:Cao, Lvchen; Luo, Yuling*; Bi, Jinjie; Qiu, Senhui; Lu, Zhenkun; Harkin, Jim; McDaid, Liam
来源:Security and Communication Networks, 2015, 8(18): 4073-4086.
DOI:10.1002/sec.1324

摘要

An authentication strategy is proposed in this paper for embedded system software copyright protection. It employs a chaotic coupled map lattices (CML) system to generate the pseudo-random numbers, which are used to construct message authentication codes (MAC) for embedded system authentication. The CML has multiple lattices where the adjacent lattices have coupled effect. When the system initial condition (e.g. lattice values and system parameters) has a marginal change, the output will have a significant change. Therefore, the proposed scheme is highly secure as the final MAC is almost impossible to be compromised. The experiment is conducted on the platform of field programmable gate array, and its corresponding results demonstrate that the proposed strategy achieved a good security performance, a high computing speed and a relatively low area overhead.