...
首页> 外文期刊>Cryptography >New Mathblocks-Based Feistel-Like Ciphers for Creating Clone-Resistant FPGA Devices
【24h】

New Mathblocks-Based Feistel-Like Ciphers for Creating Clone-Resistant FPGA Devices

机译:基于新的MathBlocks的Feistel样Ciphers,用于创建克隆FPGA器件

获取原文
           

摘要

The Secret Unknown Cipher (SUC) concept was introduced a decade ago as a promising technique for creating pure digital clone-resistant electronic units as alternatives to the traditional non-consistent Physical Unclonable Functions (PUFs). In this work, a very special unconventional cipher design is presented. The design uses hard-core FPGA (Field Programmable Gate Arrays) -Mathblocks available in modern system-on-chip (SoC) FPGAs. Such Mathblocks are often not completely used in many FPGA applications; therefore, it seems wise to make use of such dead (unused) modules to fabricate usable physical security functions for free. Standard cipher designs usually avoid deploying multipliers in the cipher mapping functions due to their high complexity. The main target of this work is to design large cipher classes (e.g., cipher class size &2600) by mainly deploying the FPGA specific mathematical cores. The proposed cipher designs are novel hardware-oriented and new in the public literature, using fully new unusual mapping functions. If a random unknown selection of one cipher out of 2600 ciphers is self-configured in a device, then a Secret Unknown Cipher module is created within a device, making it physically hard to clone. We consider the cipher module for free (for zero cost) if the major elements in the cipher module are making use of unused reanimated Mathblocks. Such ciphers are usable in many future mass products for protecting vehicular units against cloning and modeling attacks. The required self-reconfigurable devices for that concept are not available now; however, they are expected to emerge in the near future.
机译:十年前推出了秘密未知的密码(SUC)概念作为创建纯数字克隆电子单元作为传统非一致性物理不可渗透功能(PUF)的替代方案的有希望的技术。在这项工作中,提出了一个非常特殊的非常规密码设计。该设计使用现代系统(SOC)FPGA中的硬核FPGA(现场可编程门阵列)-Mathblocks。此类MathBlocks通常不会完全用于许多FPGA应用程序;因此,利用这种死(未使用的)模块似乎是明智的,以免费制造可用的物理安全功能。标准密码设计通常由于其高复杂性而避免在密码映射功能中部署乘法器。这项工作的主要目标是通过主要部署FPGA特定数学核来设计大型密码类(例如,密码类大小& 2600)。建议的密码设计是公共文献中的新型硬件导向和新的新功能,使用完全新的异常映射函数。如果在设备中自配置的一个密码中的一个密码的随机未知选择,则在设备中创建秘密未知密码模块,使其在物理上难以克隆。如果密码模块中的主要元素正在利用未使用的重新谐波MathBlocks,我们会考虑免费(对于零成本)的密码模块。这种密码可用于许多未来的批量生产,用于保护车辆单位免受克隆和建模攻击。目前无法使用所需的自我重新可重构设备;然而,预计它们将在不久的将来出现。

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号