{"title":"Obscured Asymmetric Crypto-Functions for Secured Identification","authors":"W. Adi, Shaza Zeitouni","doi":"10.1109/EST.2014.14","DOIUrl":null,"url":null,"abstract":"Emerging self-reconfiguring VLSI devices as SoC-(system-on-chip) units are offering more and more powerful computational and hardware infrastructures. Such infrastructures allow internal self-creation of even asymmetric crypto-functions and keeping them obscured and unknown within the physical device unit. Conventional asymmetric crypto-systems assume the system initiator to be a person with intelligence and access to huge resources. In difference to this conventional use, our proposed initiator is a smart device with its controllable intelligence and capability. Assuming that self-reconfiguring non-volatile SoC units would become available in the near future then such units can be dedicated to act as the substitute system initiators however with monitored capabilities obeying completely our security requirements. Such units can then self-create asymmetric ciphers with completely unknown parameters and even crypto-functions. Such units may act in a novel way as obedient initiators without being capable to reveal any sensitive information. This new operational constellation is presented in this paper. It is shown conceptually how asymmetric (public-key) crypto-functions can be created with completely unknown \"obscured\" parameters in SoC units. Several possible resulting new operation scenarios are discussed. Few sample system constellation examples using different one-way locks are demonstrated. The use of such SoC units for realizing cloneresistant devices operating in public-key mode is demonstrated by some new generic protocols.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Fifth International Conference on Emerging Security Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EST.2014.14","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Emerging self-reconfiguring VLSI devices as SoC-(system-on-chip) units are offering more and more powerful computational and hardware infrastructures. Such infrastructures allow internal self-creation of even asymmetric crypto-functions and keeping them obscured and unknown within the physical device unit. Conventional asymmetric crypto-systems assume the system initiator to be a person with intelligence and access to huge resources. In difference to this conventional use, our proposed initiator is a smart device with its controllable intelligence and capability. Assuming that self-reconfiguring non-volatile SoC units would become available in the near future then such units can be dedicated to act as the substitute system initiators however with monitored capabilities obeying completely our security requirements. Such units can then self-create asymmetric ciphers with completely unknown parameters and even crypto-functions. Such units may act in a novel way as obedient initiators without being capable to reveal any sensitive information. This new operational constellation is presented in this paper. It is shown conceptually how asymmetric (public-key) crypto-functions can be created with completely unknown "obscured" parameters in SoC units. Several possible resulting new operation scenarios are discussed. Few sample system constellation examples using different one-way locks are demonstrated. The use of such SoC units for realizing cloneresistant devices operating in public-key mode is demonstrated by some new generic protocols.