DocumentCode
185877
Title
Obscured Asymmetric Crypto-Functions for Secured Identification
Author
Adi, Wibowo ; Zeitouni, Shaza
Author_Institution
Tech. Univ. of Braunschweig, Braunschweig, Germany
fYear
2014
fDate
10-12 Sept. 2014
Firstpage
71
Lastpage
76
Abstract
Emerging self-reconfiguring VLSI devices as SoC-(system-on-chip) units are offering more and more powerful computational and hardware infrastructures. Such infrastructures allow internal self-creation of even asymmetric crypto-functions and keeping them obscured and unknown within the physical device unit. Conventional asymmetric crypto-systems assume the system initiator to be a person with intelligence and access to huge resources. In difference to this conventional use, our proposed initiator is a smart device with its controllable intelligence and capability. Assuming that self-reconfiguring non-volatile SoC units would become available in the near future then such units can be dedicated to act as the substitute system initiators however with monitored capabilities obeying completely our security requirements. Such units can then self-create asymmetric ciphers with completely unknown parameters and even crypto-functions. Such units may act in a novel way as obedient initiators without being capable to reveal any sensitive information. This new operational constellation is presented in this paper. It is shown conceptually how asymmetric (public-key) crypto-functions can be created with completely unknown "obscured" parameters in SoC units. Several possible resulting new operation scenarios are discussed. Few sample system constellation examples using different one-way locks are demonstrated. The use of such SoC units for realizing cloneresistant devices operating in public-key mode is demonstrated by some new generic protocols.
Keywords
VLSI; cryptographic protocols; system-on-chip; SoC-units; computational infrastructure; controllable capability; controllable intelligence; generic protocols; hardware infrastructure; internal self-creation; obscured asymmetric crypto-functions; obscured parameter; operational constellation; public-key crypto-functions; public-key mode; sample system constellation examples cloneresistant devices; secured identification; security requirement; self-create asymmetric ciphers; self-reconfiguring VLSI devices; self-reconfiguring nonvolatile SoC units; smart device; substitute system initiator; system-on-chip units; Ciphers; Monitoring; Protocols; Public key; System-on-chip; Clone-resistant Physical Units; Secret Unknown Ciphers; Secret Unknown Public-key Crypto-Functions; Secured Identification; Self-Reconfiguring SoC FPGAs;
fLanguage
English
Publisher
ieee
Conference_Titel
Emerging Security Technologies (EST), 2014 Fifth International Conference on
Conference_Location
Alcala de Henares
Type
conf
DOI
10.1109/EST.2014.14
Filename
6982778
Link To Document