DocumentCode :
185877
Title :
Obscured Asymmetric Crypto-Functions for Secured Identification
Author :
Adi, Wibowo ; Zeitouni, Shaza
Author_Institution :
Tech. Univ. of Braunschweig, Braunschweig, Germany
fYear :
2014
fDate :
10-12 Sept. 2014
Firstpage :
71
Lastpage :
76
Abstract :
Emerging self-reconfiguring VLSI devices as SoC-(system-on-chip) units are offering more and more powerful computational and hardware infrastructures. Such infrastructures allow internal self-creation of even asymmetric crypto-functions and keeping them obscured and unknown within the physical device unit. Conventional asymmetric crypto-systems assume the system initiator to be a person with intelligence and access to huge resources. In difference to this conventional use, our proposed initiator is a smart device with its controllable intelligence and capability. Assuming that self-reconfiguring non-volatile SoC units would become available in the near future then such units can be dedicated to act as the substitute system initiators however with monitored capabilities obeying completely our security requirements. Such units can then self-create asymmetric ciphers with completely unknown parameters and even crypto-functions. Such units may act in a novel way as obedient initiators without being capable to reveal any sensitive information. This new operational constellation is presented in this paper. It is shown conceptually how asymmetric (public-key) crypto-functions can be created with completely unknown "obscured" parameters in SoC units. Several possible resulting new operation scenarios are discussed. Few sample system constellation examples using different one-way locks are demonstrated. The use of such SoC units for realizing cloneresistant devices operating in public-key mode is demonstrated by some new generic protocols.
Keywords :
VLSI; cryptographic protocols; system-on-chip; SoC-units; computational infrastructure; controllable capability; controllable intelligence; generic protocols; hardware infrastructure; internal self-creation; obscured asymmetric crypto-functions; obscured parameter; operational constellation; public-key crypto-functions; public-key mode; sample system constellation examples cloneresistant devices; secured identification; security requirement; self-create asymmetric ciphers; self-reconfiguring VLSI devices; self-reconfiguring nonvolatile SoC units; smart device; substitute system initiator; system-on-chip units; Ciphers; Monitoring; Protocols; Public key; System-on-chip; Clone-resistant Physical Units; Secret Unknown Ciphers; Secret Unknown Public-key Crypto-Functions; Secured Identification; Self-Reconfiguring SoC FPGAs;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Emerging Security Technologies (EST), 2014 Fifth International Conference on
Conference_Location :
Alcala de Henares
Type :
conf
DOI :
10.1109/EST.2014.14
Filename :
6982778
Link To Document :
بازگشت