Key Recovery for Content Protection Using Ternary PUFs Designed with Pre-Formed ReRAM


RESEARCH PAPER Abstract "Physical unclonable functions, embedded in terminal devices, can be used as part of the recovery process of session keys that protect digital files. Such an approach is only valuable when the physical element offers sufficient tamper resistance. Otherwise, error correcting codes should be able to handle any variations arising from aging, and environmentally induce... » read more

HDCP 2.3: Enabling Robust Security Of High-Res Displays


Displays, monitors and touchscreens are the interface to our digital lives everywhere—at home, at work, and in the car. Display designers continuously upgrade their products with higher bandwidth, new technologies, and innovative features. New, modular products incorporate micro LEDs to allow new form factors, such as designing displays that are as thin as a canvas, can be rolled up, or can b... » read more

Demystifying the HDCP2.2 Authentication Process


This paper explains HDCP2.2 which is the latest generation content protection protocol. Our primary focus here is to explain how the authentication process on HDCP2.2, the various steps that are necessary in able to validate the receiver. The encryption on the keys in version 2.2 is more advanced than previous versions (HDCP1.X), which basically makes it harder to break. HDCP 2.2 is required fo... » read more