文摘
This is the work based on an existing tag design (CETD) for authenticating memory data in embedded processor systems. We present an analytical approach to discovering the security weakness of CETD. Based on the tag distribution space for individual data, we uncover the correlations between data and their tag values. We then propose a low cost design enhancement with non-linear randomization operations. The design breaks the data/tag correlation, improving the security of the design against the chosen-value attack.