Résumé de Embedded -- Physical
Résumé de Embedded -- Physical
6- Embedded systems
Vid 87 : Embedded systems constraints
Constraints of Embedded Systems
1- Limited Hardware Capabilities
Often run on low-cost or purpose-built hardware (e.g., Raspberry Pi).
Fewer ports, interfaces, or features compared to a regular computer.
Difficult to upgrade (hardware, storage, or operating system).
2- Communication Limitations
May only support specific wireless interfaces.
Not always compatible with standard networks like Ethernet or Wi-Fi.
3- Single-Purpose Design
Devices are built to perform one specific task.
No unnecessary memory or features are included.
This keeps costs low but limits flexibility or expandability.
Typically low-performance processors.
Not necessarily a bad thing — they generate less heat, which is a benefit for small, enclosed systems.
4- Power Constraints
Often powered by batteries or solar energy.
Physical access may be required to replace or recharge batteries.
Batteries may need to be manually replaced, requiring physical access to the device.
Designed for low power consumption.
5- Low Processing Power
Use low-performance CPUs, which produce less heat.
This can be an advantage in compact or remote installations.
6- Geographical Limitations
Device location (e.g., an oil field) may restrict available network types.
Can limit bandwidth and connectivity options.
7- Weak or Absent Security
Limited or no encryption capabilities.
Minimal or no authentication mechanisms.
Rarely support advanced security features like MFA or directory integration.
No authentication or very weak authentication for access to the device.
No support for multi-factor authentication (MFA) or directory services (e.g., Active Directory).
8- Limited Accessibility & Maintenance
Often lack keyboard, display, or mouse.
Firmware updates may require physical access (e.g., USB drive).
No direct access to the operating system in many cases.
9- Reliability and Lifespan
Low-cost components may reduce the device’s expected lifespan.
Hard to ensure quality or perform regular security audits.
Cost vs. Quality Trade-off: Lower cost, but at the expense of flexibility and expandability
Drones:
o Used to monitor large or difficult-to-access areas.
o On-board sensors : motion detection , thermal sensors
Faraday cage :
o Blocks electromagnetic fields
o A mesh of conductive material
o Ex : the window of a microwave oven
o But not all signal types are blocked
Guards
o Two-person integrity/control : a security practice requiring at least two authorized individuals
to be present and involved in handling sensitive or critical materials or tasks minimize
exposure to an attack
o Can be replaced by robots
5- Biometrics authentication :
usually stores a math representation of your biometric
used in very specific situations
6. Door acces controls :
conventional : lock and key
deadbolt : physical bolt
electronic : pin …
token-based : magnetic swipe card , RFID badge .
biometric
multifactor
An air gap is a physical separation between devices or networks. It's used to:
- Prevent any connection (accidental or malicious) between a secure and an insecure
network.
- Provide absolute isolation of sensitive environments.
aults and Safes :
To protect backups and sensitive equipment, organizations may use:
- Vaults: Secured rooms with controlled access; used to store backup tapes and other critical
assets.
- Safes: Smaller, secure containers with locking mechanisms; more cost-effective and flexible
for smaller facilities.
Vaults and safes protect against: Unauthorized access/
Natural disasters/ Power outages or other emergencies
Data security
SDelete (Sysinternals tool) – to securely delete individual files.
DBAN (Darik’s Boot and Nuke) – to wipe entire drives.
Designed for low-power and low-resource devices like IoT (Internet of Things).
Focuses on efficient encryption without needing powerful CPUs.
Being heavily researched by NIST (National Institute of Standards and Technology).
Goal: Maximize security while minimizing resource use
Symmetric Encryption
Asymmetric Encryption
Public key cryptography (2 or more ) mathematiccally related keys( but can’t derive the
private from the public one )
Deals with 2 types pf keys : public ans private
The private key is the only key that can decrypt data encrypted with public key
Solution to symmetric scaling problem: Asymmetric encryption provides a secure way to
share encryption keys.
More resource-intensive than symmetric encryption, requires more CPU power.
Often used together with symmetric encryption:
o Asymmetric encryption is used to securely transfer a symmetric key.
o Then, symmetric encryption is used for the actual data exchange.
Performance Trade-Off
Asymmetric encryption uses large prime numbers and requires significant CPU power.
Not ideal for:
o Mobile devices
o IoT (Internet of Things) device
A hash is a function that takes any type of input—document, audio, video, large/small files—
and produces a unique string of text called a message digest, checksum, or fingerprint.
Similar to a fingerprint, a hash uniquely identifies the input but cannot be used to recreate
the original input (one-way function).
1. One-Way trip :
o Once data is hashed, it’s not possible to retrieve the original data from the hash.
2. Deterministic ( no collision ):
o The same input always produces the same hash.
3. Fixed Size Output:
o No matter the input size, the hash is always a fixed-length string.
4. Unique Output:
o Different inputs produce different hashes. If not, a collision has occurred, which is undesirabl
5. Avalanche Effect:
o A small change in input (e.g., changing a period to an exclamation mark) produces a drasticall
different hash.
Instead of storing passwords in plain text, systems store the hashed version.
During login, the input password is hashed and compared to the stored hash.
If hashes match → correct password.
Hashes can verify that a file hasn’t changed during transmission or download.
Re-hash the downloaded file and compare to the provided hash.
3. Digital Signatures
1. Alice:
o Hashes the message.
o Encrypts the hash using her private key → this becomes the digital signature.
o Sends the message + digital signature to Bob.
2. Bob:
o Decrypts the digital signature using Alice’s public key to get the original hash.
o Hashes the received message himself.
o Compares both hashes.
o If they match → the message is authentic, from Alice, and hasn’t been altered.
Key strength :
Real-time encryption/decryption
There is a need for fast security without compromising the security part (the ability to
exchange keys without sending the key in the clear across the network )
Use asymmetric encryption (e.g., public key) to encrypt a symmetric key. :
- Client encrypts a symmetric session key using the server’s public key
- Server decrypts it using its private key
- Now both share a secure symmetric key for fast data exchange
If private keys don't change, someone who intercepts encrypted data + obtains your private
key can decrypt past communications.
Example: A TLS web server uses the same key pair for all sessions.
Vid 95 : Staganography
Steganography techniques
1. Network-based:
o Extra bits hidden in network packets
o Receiver assembles them into a hidden message
2. Image-based:
o Common method; the larger the image, the more data it can hide
o Embed the msg in the image itself
3. Printer tracking dots:
o Laser printers often embed tiny yellow dots on printouts
o These dots reveal metadata (e.g., printer ID, date/time)
4. Audio steganography:
o Data (like documents) can be embedded in audio files
5. Video steganography:
o Video files can hold large amounts of hidden data due to their size
Quantum computing is based on quantum physics, unlike traditional computing which relies
on classical physics and binary bits (0s and 1s).
It's not a replacement for regular computers, but a complementary technology used for
specialized tasks.
Takeaway: A small number of qubits can represent a huge amount of data simultaneously,
which enables massive parallelism.
Real-World Applications
Impact on Cryptography
Traditional encryption (e.g., RSA) relies on the difficulty of factoring large prime numbers.
Quantum computers can break this using Shor’s algorithm (1994), which makes factoring
dramatically faster.
This could render current encryption useless in a quantum-capable future.
Post-Quantum Cryptography
Lattice-based encryption (e.g., "NTRU") uses math problems like the Closest Vector Problem,
which are still hard for quantum computers instead of finding the prime factorizations of large
numbers
These are being studied to future-proof encryption.
Encryption Basics
Stream Cipher
Block Cipher
Simplest mode.
Each block encrypted independently using the same key.
Problem: Identical plaintext blocks → identical ciphertext blocks.
o Example: Encrypting an image with ECB still reveals recognizable patterns.
Not recommended for encrypting large, structured data.
Adds randomization by XORing ( xor : 2 inputs indetical the output is 0 ) each plaintext block
with the previous ciphertext block before encrypting.
First block uses an Initialization Vector (IV).
Solves the pattern problem in ECB.
Each block's encryption depends on the previous block: the previous result ciphertext is used
as an iv for the next block
Commonly used and more secure than ECB.
What is a Blockchain?
3. Verification
4. Block Formation
5. Hashing
The new block (with its hash) is added to the chain of previous blocks.
This full chain is replicated across all nodes in the network.
Security via Hashing
This is just an overview of the process of blockchain , every blockchain technology has different minor
nuances , differents features and capabilities
Cryptography helps secure data, ensure integrity, provide authentication, and even hide malicious
code. It is widely used across devices and applications.
We depend on mobile phones, tablets, and other small devices for daily tasks.
These devices have:
o Limited storage
o Limited CPU power
o Limited battery life
Encryption is essential to protect data on them.
But due to resource limits, we use:
o Smaller symmetric keys
o Elliptic Curve Cryptography (ECC):
Designed for low-power, resource-constrained environments.
Provides strong encryption without consuming much power or space.
We should ensure a low latency by using a symmetric encryption ans smaller key sizes , and
high resiliency by hashing and using a larger key sizes (so finding the balance is critical)
Use cases
Speed : we should ensure that the app can perform quick enough with the crypto algo used
(CPU , power , battery life … can handle this algo)
Size : consider storage while using block ciphers for example because it use padding
Weak keys : Larger keys are more resistant to brute-force attacks./ A famous failure: WEP
(Wired Equivalent Privacy) used a weak initialization vector with RC4,this introduced
vulnerabilities, making it easy to crack wireless traffic
Time : encryption and hashing taked time so larger files take longer / asymmetric is
slow than symmetric
Longevity : how long this encryption type is able to be used as time goes
DES (Data Encryption Standard) was secure in 1977, by 1999, it was brute-forced in
22 hours.
o Use larger key sizes to extend the usable life of your encryption algorithms.
Predictability and entropy : Random numbers are critical for secure cryptography but
hardware ranadom generators can be predictable so weak or guessable passphrases
make even strong crypto useless.
Key reuse : reusing the same key reduces complexity (less cost , effort … ) but if the
key is compromised , everything using thet key is at risk . Changing keys in IoT devices
requires a firmware update
Ressource vs security constraints : IoT devices have limited CPU , memory and power ,
and there is a little room for encryptiondecryption so there is a trade-off between
security and functionality -> security is often left to the user : manage security updates
and choose implementation strategies to properly secure the device