Abstract

The Secret Unknown Cipher (SUC) concept was introduced a decade ago as a promising technique for creating pure digital clone-resistant electronic units as alternatives to the traditional non-consistent Physical Unclonable Functions (PUFs). In this work, a very special unconventional cipher design is presented. The design uses hard-core FPGA (Field Programmable Gate Arrays) -Mathblocks available in modern system-on-chip (SoC) FPGAs. Such Mathblocks are often not completely used in many FPGA applications; therefore, it seems wise to make use of such dead (unused) modules to fabricate usable physical security functions for free. Standard cipher designs usually avoid deploying multipliers in the cipher mapping functions due to their high complexity. The main target of this work is to design large cipher classes (e.g., cipher class size >2600) by mainly deploying the FPGA specific mathematical cores. The proposed cipher designs are novel hardware-oriented and new in the public literature, using fully new unusual mapping functions. If a random unknown selection of one cipher out of 2600 ciphers is self-configured in a device, then a Secret Unknown Cipher module is created within a device, making it physically hard to clone. We consider the cipher module for free (for zero cost) if the major elements in the cipher module are making use of unused reanimated Mathblocks. Such ciphers are usable in many future mass products for protecting vehicular units against cloning and modeling attacks. The required self-reconfigurable devices for that concept are not available now; however, they are expected to emerge in the near future.

Highlights

  • One of the most significant security threats to emerging electronic devices is cloning or theft of identity

  • A set of CRPs can be given as a training set to a Machine learning (ML) algorithm, which constructs a predictive model of the Physically Unclonable Functions (PUFs)

  • The Secret Unknown Cipher (SUC) creation process is performed by a GENIE program that will run in an enrollment process for each device

Read more

Summary

Introduction

One of the most significant security threats to emerging electronic devices is cloning or theft of identity. Several proposals were introduced for identifying an electronic device by using a secret stored key in an embedded non-volatile memory (NVM) [1]. Such technology has been proven inefficient against physical attacks [2]. This paper introduces a new proposal of an unknown cipher/ function serving as a digital PUF. New Contributions: This work is a new approach and improvement to follow our recent publications [12,13,14] toward developing unknown cipher functions to serve as digital PUFs. This paper introduces novel Mathblocks-based involutions for a Feistel-like class of new Secret Unknown. The overall resulting security quality and implementation efficiency is shown to exceed the conventional cipher structures in anti-cloning applications

State of the Art on Unclonable Electronic Units
PUF-Based Unkown Key Generation for Pseudo-Random Fuctions
A Block Cipher Deploying PUFs as Unkown Round Functions
A Block Cipher Deploying
The Concept of Secret Unknown
Creation
If x’i Figure
New SUC
A New Feistel-Like Cipher Class
A T-function is defined as follows
Distinguishing Attack on the Proposed Feistel-Like Cipher
Bricklayer Function as a Possible Inner Function f
How Can the SUC-Creating GENIE Work?
A Possible Prototype Hardware Implementation
Modeling Attacks on SUC
Cryptanalysis of a Cipher with Secret Components
Post-Quantum Exhaustive Search for SUC Model
Findings
Discussion and Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.