Skip to main content

A Cipher Class Based on Golden S-Boxes for Creating Clone-Resistant Identities

  • Conference paper
  • First Online:
  • 691 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11398))

Abstract

Secret Unknown Cipher (SUC) concept was proposed as a promising technique to create clone-resistant electronic units as alternative to overcome the weaknesses of the traditional Physical Unclonable Functions (PUFs). A low-complexity real-field realization scenario for the proposed SUC concept is presented in this work. The key realization concept is making use of the so-called Golden S-Boxes as basic building blocks of block ciphers. According to the new proposed concept, the cipher creator called “GENIE” generates unknown ciphers with relatively low memory and time complexities. The target technology to accommodate the proposed self-created hard to predict SUCs is the non-volatile FPGA System on Chip (SoC) units converting them into clone-resistant entities.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Xu, T., Potkonjak, M.: The digital bidirectional function as a hardware security primitive: architecture and applications. In: 2015 IEEE/ACM International Symposium on Low Power Electronics and Design (ISLPED), pp. 335–340. IEEE, July 2015

    Google Scholar 

  2. Delvaux, J., Gu, D., Peeters, R., Verbauwhede, I.: A survey on lightweight entity authentication with strong PUFs. Cryptology ePrint Archive: Report 2014/977

    Google Scholar 

  3. Rührmair, U., Sehnke, F., Sölter, J., Dror, G., Devadas, S., Schmidhuber, J.: Modeling attacks on physical unclonable functions. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 237–249. ACM, October 2010

    Google Scholar 

  4. Adi, W.: Clone-resistant DNA-like secured dynamic identity. In: ECSIS Symposium on Bioinspired Learning and Intelligent Systems for Security, BLISS 2008, pp. 148–153. IEEE (2008)

    Google Scholar 

  5. Xu, T., Potkonjak, M.: Robust and flexible FPGA-based digital PUF. In: 2014 24th International Conference on Field Programmable Logic and Applications (FPL), pp. 1–6. IEEE, September 2014

    Google Scholar 

  6. Leander, G., Poschmann, A.: On the classification of 4 bit S-Boxes. In: Carlet, C., Sunar, B. (eds.) WAIFI 2007. LNCS, vol. 4547, pp. 159–176. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73074-3_13

    Chapter  MATH  Google Scholar 

  7. Saarinen, M.-J.O.: Cryptographic analysis of all 4 × 4-bit S-Boxes. In: Miri, A., Vaudenay, S. (eds.) SAC 2011. LNCS, vol. 7118, pp. 118–133. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-28496-0_7

    Chapter  Google Scholar 

  8. Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Springer, Heidelberg (2001). https://doi.org/10.1007/978-3-662-04722-4

    Book  MATH  Google Scholar 

  9. Fyrbiak, M., Kison, C., Jeske, M., Adi, W.: Combined HW-SW adaptive clone-resistant functions as physical security anchors. In: NASA/ESA Conference on Adaptive Hardware and Systems, AHS 2013 (2013)

    Google Scholar 

  10. Hoang, V.T., Rogaway, P.: On generalized feistel networks. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 613–630. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14623-7_33

    Chapter  Google Scholar 

  11. Kolay, S., Mukhopadhyay, D.: Khudra: a new lightweight block cipher for FPGAs. In: Chakraborty, R.S., Matyas, V., Schaumont, P. (eds.) SPACE 2014. LNCS, vol. 8804, pp. 126–145. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-12060-7_9

    Chapter  Google Scholar 

  12. Wu, J., O’Neill, M.: On foundation and construction of physical unclonable functions. IACR Cryptology ePrint Archive 2010, p. 171 (2010)

    Google Scholar 

  13. Mars, A., et al.: Random stream cipher as a PUF-like identity in FPGA environment. In: Proceedings of 2017 7th International Conference on Emerging Security Technologies, EST 2017 (2017)

    Google Scholar 

  14. Adi, W., et al.: Generic identification protocols by deploying Secret Unknown Ciphers (SUCs). In: 2017 IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2017, pp. 255–256 (2017)

    Google Scholar 

Download references

Acknowledgment

The authors would like to thank Volkswagen AG as well as the German Academic Exchange Service DAAD scholarship program, the Federal Foreign Office funding by DAAD combined scholarship and support programme (STIBET) for supporting this basic research activity.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Saleh Mulhem .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mulhem, S., Mars, A., Adi, W. (2019). A Cipher Class Based on Golden S-Boxes for Creating Clone-Resistant Identities. In: Fournaris, A., Lampropoulos, K., Marín Tordera, E. (eds) Information and Operational Technology Security Systems. IOSec 2018. Lecture Notes in Computer Science(), vol 11398. Springer, Cham. https://doi.org/10.1007/978-3-030-12085-6_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-12085-6_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-12084-9

  • Online ISBN: 978-3-030-12085-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics