首页> 外文会议>IEEE International Symposium on Multiple-Valued Logic >On Constructing Secure and Hardware-Efficient Invertible Mappings
【24h】

On Constructing Secure and Hardware-Efficient Invertible Mappings

机译:关于构造安全且硬件高效的可逆映射

获取原文

摘要

Our society becomes increasingly dependent on wireless communications. The tremendous growth in the number and type of wirelessly connected devices in a combination with the dropping cost for performing cyberattacks create new challenges for assuring security of services and applications provided by the next generation of wireless communication networks. The situation is complicated even further by the fact that many end-point Internet of Things (IoT) devices have very limited resources for implementing security functionality. This paper addresses one of the aspects of this important, many-faceted problem - the design of hardware-efficient cryptographic primitives suitable for the protection of resource-constrained IoT devices. We focus on cryptographic primitives based on the invertible mappings of type {0,1,,2n-1} → {0,1,,2n-1}. In order to check if a given mapping is invertible or not, we generally need an exponential in n number of steps. In this paper, we derive a sufficient condition for invertibility which can be checked in O(n2N) time, where N is the size of representation of the largest function in the mapping. Our results can be used for constructing cryptographically secure invertible mappings which can be efficiently implemented in hardware.
机译:我们的社会越来越依赖于无线通信。无线连接设备的数量和类型的巨大增长,加上执行网络攻击的成本不断下降,为确保下一代无线通信网络提供的服务和应用程序的安全性提出了新的挑战。由于许多端点物联网(IoT)设备具有非常有限的资源来实现安全功能,因此情况变得更加复杂。本文解决了这个重要的,多方面的问题的一个方面,即适用于保护资源受限的IoT设备的硬件有效的密码原语的设计。我们专注于基于类型{0,1,,2n-1}→{0,1,,2n-1}的可逆映射的密码基元。为了检查给定的映射是否可逆,我们通常需要n个步骤中的指数。在本文中,我们导出了一个可逆性的充分条件,可以在O(n2N)时间中对其进行检查,其中N是映射中最大函数的表示大小。我们的结果可用于构建可在硬件中有效实施的密码安全的可逆映射。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号