Sentinel Keys Offer Sophisticated ProtectionSentinel Hardware Keys Developer’s Guide 7Sentinel Keys Offer Sophisticated ProtectionThis section provides a summary of the main features of Sentinel Keys SDK,which make it the most reliable and chosen solution to protect your intellec-tual property and copyrights.Hardware Key with Cutting-edge Security TechnologySentinel Keys use the cutting-edge technology for superior security. Here arethe major highlights of the hardware key:■ Contains the ECC algorithm for digital signing and verification,providing data authentication, confidentiality, integrity, and non-repudiation.■ Contains the 128-bit AES algorithm for block encryption/decryptionand query-response protection.■ Provides secure communication using the Secure CommunicationTunnel. The tunnel is an end-to-end secured session between the clientand the Sentinel Key. The communication packets are encryptedusing the AES algorithm, for which the session key is generated usingECC-based key exchange (ECKAS-DH1).■ Allows random generation of ECC and AES keys. Unlimited number ofkeys can be generated.■ Uses chip-on-board (COB) technology for better performance, highreliability, and greater protection against reverse engineering.■ Uses mirroring and self-correction for higher reliability againstmemory corruption.■ Has the in-built capability to write-once in the field. It means thatignoring the access rights, the data can be modified at run-time onlyonce. Hence, it prevents unauthorized revisions of the data containedin the Sentinel Key.■ Supports universal binaries for compatibility with PowerPC and Intel-based Macintosh systems.