一种提高计算机安全性的二维混沌逻辑门

James W. Bohl, Lok K. Yan, G. Rose
{"title":"一种提高计算机安全性的二维混沌逻辑门","authors":"James W. Bohl, Lok K. Yan, G. Rose","doi":"10.1109/MWSCAS.2015.7282078","DOIUrl":null,"url":null,"abstract":"In recent years the concept of chaos-based computing has emerged as a way to harness the rich state space of chaotic systems for robust computation. Potential advantages of such chaotic computational elements include improved security in the form of logic obfuscation and power analysis mitigation. For example, the chaotic nature of computation leads to a chaotic power profile that is difficult to use for side-channel attacks. In this paper, we explore the construction of chaotic logic gates based on Chua's circuit. We propose a two-dimensional chaotic logic gate that utilizes the two state variables of Chua's circuit to implement all possible two-input logic functions. Further, the likelihood of any logic function is shown to approach 1/16 as the evolution time of the gate is increased. Equally likely functions are beneficial from a security perspective in that the power profile and potentially the logic itself can be obfuscated from potential attackers. It is difficult to determine the effective logic function without knowledge of past states.","PeriodicalId":216613,"journal":{"name":"2015 IEEE 58th International Midwest Symposium on Circuits and Systems (MWSCAS)","volume":"416 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"A two-dimensional chaotic logic gate for improved computer security\",\"authors\":\"James W. Bohl, Lok K. Yan, G. Rose\",\"doi\":\"10.1109/MWSCAS.2015.7282078\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years the concept of chaos-based computing has emerged as a way to harness the rich state space of chaotic systems for robust computation. Potential advantages of such chaotic computational elements include improved security in the form of logic obfuscation and power analysis mitigation. For example, the chaotic nature of computation leads to a chaotic power profile that is difficult to use for side-channel attacks. In this paper, we explore the construction of chaotic logic gates based on Chua's circuit. We propose a two-dimensional chaotic logic gate that utilizes the two state variables of Chua's circuit to implement all possible two-input logic functions. Further, the likelihood of any logic function is shown to approach 1/16 as the evolution time of the gate is increased. Equally likely functions are beneficial from a security perspective in that the power profile and potentially the logic itself can be obfuscated from potential attackers. It is difficult to determine the effective logic function without knowledge of past states.\",\"PeriodicalId\":216613,\"journal\":{\"name\":\"2015 IEEE 58th International Midwest Symposium on Circuits and Systems (MWSCAS)\",\"volume\":\"416 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 IEEE 58th International Midwest Symposium on Circuits and Systems (MWSCAS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MWSCAS.2015.7282078\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE 58th International Midwest Symposium on Circuits and Systems (MWSCAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MWSCAS.2015.7282078","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

摘要

近年来,基于混沌计算的概念作为一种利用混沌系统的丰富状态空间进行鲁棒计算的方法而出现。这种混沌计算元素的潜在优势包括以逻辑混淆和功率分析缓解的形式提高安全性。例如,计算的混沌特性导致难以用于侧信道攻击的混沌功率分布。本文探讨了基于蔡氏电路的混沌逻辑门的构造。我们提出一种二维混沌逻辑门,利用蔡氏电路的两个状态变量来实现所有可能的双输入逻辑功能。此外,随着门的演化时间的增加,任何逻辑函数的可能性接近1/16。从安全角度来看,同样可能的功能是有益的,因为电源配置文件和潜在的逻辑本身可以对潜在的攻击者进行混淆。如果不知道过去的状态,很难确定有效的逻辑函数。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A two-dimensional chaotic logic gate for improved computer security
In recent years the concept of chaos-based computing has emerged as a way to harness the rich state space of chaotic systems for robust computation. Potential advantages of such chaotic computational elements include improved security in the form of logic obfuscation and power analysis mitigation. For example, the chaotic nature of computation leads to a chaotic power profile that is difficult to use for side-channel attacks. In this paper, we explore the construction of chaotic logic gates based on Chua's circuit. We propose a two-dimensional chaotic logic gate that utilizes the two state variables of Chua's circuit to implement all possible two-input logic functions. Further, the likelihood of any logic function is shown to approach 1/16 as the evolution time of the gate is increased. Equally likely functions are beneficial from a security perspective in that the power profile and potentially the logic itself can be obfuscated from potential attackers. It is difficult to determine the effective logic function without knowledge of past states.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信