Browse > Article
http://dx.doi.org/10.6109/jkiice.2016.20.12.2282

The Proposed of the Encryption Method and Designed of the Secure Key Using Initial Bad Block Information Physical Address of NAND Flash Memory  

Kim, Seong Ryeol (Department of Computer & Information Engineering, Cheongju University)
Abstract
Security key generation method by hardware or software related techniques have been variously proposed. This study analyzed the existing security key generation techniques, and propose the design of a new NAND Bad block based security key(NBSK) using a Bad Block information in the NAND flash memory, and propose a new encryption method using the same. Bad Block present in the NAND flash memory is also generated during production and sometimes occur during operations. Initial Bad Block information generated during production is not changed, Bad Block information that may occur during operation has a characteristic that can be changed periodically. This study is designed of the new secure key using initial Bad Block information physical address generated during manufacturing a NAND flash memory, and proposed of the new encryption method. With the proposed key and method can satisfy the general security characteristics, such as the creation and distribution of the secure key authentication and confidentiality and the simplicity of the security key.
Keywords
Bad Block; BBT; NAND; Secure Key;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 NAND [Internet], Available: http://pastime0.tistory.com/entry/NAND.
2 NAND bad blocks [Internet], Available: http://wiki.openmoko.org/wiki/NAND_bad_blocks.
3 C. H Wu, "A Bad-Block Test Design for Multiple Flash-Memory Chips", Journal of information Science and Engineering, vol. 28, pp.1091-1104, 2012.
4 S. R. Kim, "Design of a User Authentication System using the Device Constant Information", Journal of IT Convergence Society for SMB, vol. 6, no. 3, pp.29-35, Sep. 2016.   DOI
5 Ho-seok Ryu et al, "Group Key Management Method for Secure Device in Smart Home Environment", Journal of The Korea Institute of Information Security & Cryptology, vol. 25, no. 2, pp. 479-487, Apr. 2015.   DOI
6 KISA "IT Security Evaluation & Certification Guide with Common Criteria (ISO 15408)", KISA, 4. 2009.
7 Information Security [Internet], Available: http://m.blog.naver.com/PostList.nhn?blogId=nttkak&categoryNo=19¤tPage=1.
8 Development and Analysis of Block Ciphers and the DES System [Internet], Available: http://homepage.usask.ca/-dtr467/400/.
9 L. M. Adleman, R. L. Rivest, and A. Shamir, "A method for obtaining digital signatures and public-key cryptosystems", Communications of the ACM, vol.21, pp.120-126, 1978.   DOI
10 RSA [Internet], Available: https://ko.wikipedia.org/wiki/RSA_%EC%95%94%ED%98%B8.
11 HSM(Hardware Security Modules) [Internet], Available: https://handouts.secappdev.org/handouts/2010/Filip%20Demaertelaere/HSM.pdf.
12 Microsoft CryptoAPI [Internet], Available: https://en.wikipedia.org/ wiki/MicrosoftCryptoAPI.
13 Micron, "Bad Block Management in NAND Flash Memory", Micron Technology Inc., TN-29-59, 2011.
14 Samsung NAND Flash Code Information(1/3) [Internet], Available: http://www.samsung.com/global/business/semiconductor/html/common/file/support/part_number_decoder/Nand_Flash.pdf.
15 Open NAND Flash Interface specification: Block Abstracted NAND [Internet], Available: http://www.onfi.org/-/media/ONFI/specs/BA_NAND_rev_1_1_Gold.pdf.