首页 > 最新文献

IACR Trans. Cryptogr. Hardw. Embed. Syst.最新文献

英文 中文
Separating Oil and Vinegar with a Single Trace 用单一的痕迹分离油和醋
Pub Date : 2023-06-09 DOI: 10.46586/tches.v2023.i3.221-245
Thomas Aulbach, Fabio Campos, Juliane Krämer, Simona Samardjiska, Marc Stöttinger
Due to recent cryptanalytical breakthroughs, the multivariate signature schemes that seemed to be most promising in the past years are no longer in the focus of the research community. Hence, the cryptographically mature UOV scheme is of great interest again. Since it has not been part of the NIST process for standardizing post-quantum cryptography so far, it has not been studied intensively for its physical security.In this work, we present a side-channel attack on the latest implementation of UOV. In the first part of the attack, a single side-channel trace of the signing process is used to learn all vinegar variables used in the computation. Then, we employ a combination of the Kipnis-Shamir attack and the reconciliation attack to reveal the complete secret key. Our attack, unlike previous work, targets the inversion of the central map and not the subsequent linear transformation. It further does not require the attacker to control the message to be signed.We have verified the practicality of our attack on a ChipWhisperer-Lite board with a 32-bit STM32F3 ARM Cortex-M4 target mounted on a CW308 UFO board. We publicly provide the code and both reference and target traces. Additionally, we discuss several countermeasures that can at least make our attack less efficient.
由于最近的密码分析突破,过去几年似乎最有前途的多元签名方案不再是研究界的焦点。因此,密码学成熟的UOV方案再次引起了人们的极大兴趣。由于到目前为止,它还没有成为NIST标准化后量子加密过程的一部分,因此它的物理安全性还没有得到深入研究。在这项工作中,我们提出了一种针对UOV最新实现的侧信道攻击。在攻击的第一部分中,使用签名过程的单个侧通道跟踪来学习计算中使用的所有醋变量。然后,我们使用Kipnis-Shamir攻击和和解攻击的组合来揭示完整的密钥。与之前的工作不同,我们的攻击针对的是中心映射的反演,而不是随后的线性变换。它也不需要攻击者控制要签名的消息。我们已经验证了我们在ChipWhisperer-Lite板上攻击的实用性,该板上安装了一个32位STM32F3 ARM Cortex-M4目标,安装在CW308 UFO板上。我们公开提供代码以及引用和目标跟踪。此外,我们讨论了几种对策,至少可以降低我们的攻击效率。
{"title":"Separating Oil and Vinegar with a Single Trace","authors":"Thomas Aulbach, Fabio Campos, Juliane Krämer, Simona Samardjiska, Marc Stöttinger","doi":"10.46586/tches.v2023.i3.221-245","DOIUrl":"https://doi.org/10.46586/tches.v2023.i3.221-245","url":null,"abstract":"Due to recent cryptanalytical breakthroughs, the multivariate signature schemes that seemed to be most promising in the past years are no longer in the focus of the research community. Hence, the cryptographically mature UOV scheme is of great interest again. Since it has not been part of the NIST process for standardizing post-quantum cryptography so far, it has not been studied intensively for its physical security.In this work, we present a side-channel attack on the latest implementation of UOV. In the first part of the attack, a single side-channel trace of the signing process is used to learn all vinegar variables used in the computation. Then, we employ a combination of the Kipnis-Shamir attack and the reconciliation attack to reveal the complete secret key. Our attack, unlike previous work, targets the inversion of the central map and not the subsequent linear transformation. It further does not require the attacker to control the message to be signed.We have verified the practicality of our attack on a ChipWhisperer-Lite board with a 32-bit STM32F3 ARM Cortex-M4 target mounted on a CW308 UFO board. We publicly provide the code and both reference and target traces. Additionally, we discuss several countermeasures that can at least make our attack less efficient.","PeriodicalId":13186,"journal":{"name":"IACR Trans. Cryptogr. Hardw. Embed. Syst.","volume":"51 1","pages":"221-245"},"PeriodicalIF":0.0,"publicationDate":"2023-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82884203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure Firmware Update: Challenges and Solutions 安全固件更新:挑战和解决方案
Pub Date : 2023-06-01 DOI: 10.3390/cryptography7020030
Luigi Catuogno, Clemente Galdi
The pervasiveness of IoT and embedded devices allows the deployment of services that were unthinkable only few years ago. Such devices are typically small, run unattended, possibly on batteries and need to have a low cost of production. As all software systems, this type of devices need to be updated for different reasons, e.g., introducing new features, improving/correcting existing functionalities or fixing security flaws. At the same time, because of their low-complexity, standard software distribution platforms and techniques cannot be used to update the software. In this paper we review the current limitations posed to software distribution systems for embedded/IoT devices, consider challenges that the researchers in this area have been identifying and propose the corresponding solutions.
物联网和嵌入式设备的普及使得几年前无法想象的服务部署成为可能。这类设备通常很小,运行时无人值守,可能使用电池,并且需要低生产成本。与所有软件系统一样,这类设备需要因不同原因进行更新,例如引入新功能、改进/纠正现有功能或修复安全漏洞。同时,由于标准的软件发布平台和技术复杂性较低,无法用于软件更新。在本文中,我们回顾了当前嵌入式/物联网设备软件分发系统的限制,考虑了该领域研究人员已经确定的挑战,并提出了相应的解决方案。
{"title":"Secure Firmware Update: Challenges and Solutions","authors":"Luigi Catuogno, Clemente Galdi","doi":"10.3390/cryptography7020030","DOIUrl":"https://doi.org/10.3390/cryptography7020030","url":null,"abstract":"The pervasiveness of IoT and embedded devices allows the deployment of services that were unthinkable only few years ago. Such devices are typically small, run unattended, possibly on batteries and need to have a low cost of production. As all software systems, this type of devices need to be updated for different reasons, e.g., introducing new features, improving/correcting existing functionalities or fixing security flaws. At the same time, because of their low-complexity, standard software distribution platforms and techniques cannot be used to update the software. In this paper we review the current limitations posed to software distribution systems for embedded/IoT devices, consider challenges that the researchers in this area have been identifying and propose the corresponding solutions.","PeriodicalId":13186,"journal":{"name":"IACR Trans. Cryptogr. Hardw. Embed. Syst.","volume":"2 1","pages":"30"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84250625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Timing-Attack-Resistant Acceleration of NTRU Round 3 Encryption on Resource-Constrained Embedded Systems 资源受限嵌入式系统中NTRU第3轮加密的抗时序攻击加速
Pub Date : 2023-06-01 DOI: 10.3390/cryptography7020029
Eros Camacho-Ruiz, M. Martínez-Rodríguez, S. Sánchez-Solano, Piedad Brox Jiménez
The advent of quantum computing with high processing capabilities will enable brute force attacks in short periods of time, threatening current secure communication channels. To mitigate this situation, post-quantum cryptography (PQC) algorithms have emerged. Among the algorithms evaluated by NIST in the third round of its PQC contest was the NTRU cryptosystem. The main drawback of this algorithm is the enormous amount of time required for the multiplication of polynomials in both the encryption and decryption processes. Therefore, the strategy of speeding up this algorithm using hardware/software co-design techniques where this operation is executed on specific hardware arises. Using these techniques, this work focuses on the acceleration of polynomial multiplication in the encryption process for resource-constrained devices. For this purpose, several hardware multiplications are analyzed following different strategies, taking into account the fact that there are no possible timing information leaks and that the available resources are optimized as much as possible. The designed multiplier is encapsulated as a fully reusable and parametrizable IP module with standard AXI4-Stream interconnection buses, which makes it easy to integrate into embedded systems implemented on programmable devices from different manufacturers. Depending on the resource constraints imposed, accelerations of up to 30–45 times with respect to the software-level multiplication runtime can be achieved using dedicated hardware, with a device occupancy of around 5%.
具有高处理能力的量子计算的出现将使暴力攻击在短时间内成为可能,威胁到当前的安全通信通道。为了缓解这种情况,出现了后量子密码学(PQC)算法。NIST在第三轮PQC竞赛中评估的算法中有NTRU密码系统。该算法的主要缺点是在加密和解密过程中多项式的乘法都需要大量的时间。因此,使用硬件/软件协同设计技术加速该算法的策略出现了,其中该操作在特定硬件上执行。使用这些技术,本工作的重点是在资源受限设备的加密过程中加速多项式乘法。为此,我们按照不同的策略分析了几种硬件乘法,同时考虑到不存在可能的时间信息泄漏和尽可能优化可用资源的事实。所设计的乘法器被封装为一个完全可重用和可参数化的IP模块,带有标准的AXI4-Stream互连总线,这使得它很容易集成到不同制造商的可编程设备上实现的嵌入式系统中。根据所施加的资源限制,使用专用硬件可以实现软件级乘法运行时高达30-45倍的加速,设备占用率约为5%。
{"title":"Timing-Attack-Resistant Acceleration of NTRU Round 3 Encryption on Resource-Constrained Embedded Systems","authors":"Eros Camacho-Ruiz, M. Martínez-Rodríguez, S. Sánchez-Solano, Piedad Brox Jiménez","doi":"10.3390/cryptography7020029","DOIUrl":"https://doi.org/10.3390/cryptography7020029","url":null,"abstract":"The advent of quantum computing with high processing capabilities will enable brute force attacks in short periods of time, threatening current secure communication channels. To mitigate this situation, post-quantum cryptography (PQC) algorithms have emerged. Among the algorithms evaluated by NIST in the third round of its PQC contest was the NTRU cryptosystem. The main drawback of this algorithm is the enormous amount of time required for the multiplication of polynomials in both the encryption and decryption processes. Therefore, the strategy of speeding up this algorithm using hardware/software co-design techniques where this operation is executed on specific hardware arises. Using these techniques, this work focuses on the acceleration of polynomial multiplication in the encryption process for resource-constrained devices. For this purpose, several hardware multiplications are analyzed following different strategies, taking into account the fact that there are no possible timing information leaks and that the available resources are optimized as much as possible. The designed multiplier is encapsulated as a fully reusable and parametrizable IP module with standard AXI4-Stream interconnection buses, which makes it easy to integrate into embedded systems implemented on programmable devices from different manufacturers. Depending on the resource constraints imposed, accelerations of up to 30–45 times with respect to the software-level multiplication runtime can be achieved using dedicated hardware, with a device occupancy of around 5%.","PeriodicalId":13186,"journal":{"name":"IACR Trans. Cryptogr. Hardw. Embed. Syst.","volume":"84 1","pages":"29"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74807901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Flexible and Efficient Multi-Keyword Ranked Searchable Attribute-Based Encryption Schemes 灵活高效的多关键字排序可搜索属性加密方案
Pub Date : 2023-05-15 DOI: 10.3390/cryptography7020028
Je-Kuan Lin, Wun-Ting Lin, Jake Wu
Currently, cloud computing has become increasingly popular and thus, many people and institutions choose to put their data into the cloud instead of local environments. Given the massive amount of data and the fidelity of cloud servers, adequate security protection and efficient retrieval mechanisms for stored data have become critical problems. Attribute-based encryption brings the ability of fine-grained access control and can achieve a direct encrypted data search while being combined with searchable encryption algorithms. However, most existing schemes only support single-keyword or provide no ranking searching results, which could be inflexible and inefficient in satisfying the real world’s actual needs. We propose a flexible multi-keyword ranked searchable attribute-based scheme using search trees to overcome the above-mentioned problems, allowing users to combine their fuzzy searching keywords with AND–OR logic gates. Moreover, our enhanced scheme not only improves its privacy protection but also goes a step further to apply a semantic search to boost the flexibility and the searching experience of users. With the proposed index-table method and the tree-based searching algorithm, we proved the efficiency and security of our schemes through a series of analyses and experiments.
目前,云计算已经变得越来越流行,因此,许多人和机构选择将他们的数据放在云中而不是本地环境中。考虑到海量数据和云服务器的保真度,对存储数据进行充分的安全保护和有效的检索机制已成为关键问题。基于属性的加密带来了细粒度访问控制的能力,并且可以与可搜索的加密算法相结合,实现直接的加密数据搜索。然而,大多数现有方案只支持单个关键字或不提供排序搜索结果,这在满足现实世界的实际需求方面可能不够灵活和低效。为了克服上述问题,我们提出了一种灵活的基于搜索树的多关键字排序可搜索属性方案,允许用户将模糊搜索关键字与“与或”逻辑门相结合。此外,我们的改进方案不仅提高了其隐私保护,而且进一步应用了语义搜索,提高了用户的搜索灵活性和搜索体验。利用所提出的索引表方法和基于树的搜索算法,通过一系列的分析和实验证明了所提出方案的有效性和安全性。
{"title":"Flexible and Efficient Multi-Keyword Ranked Searchable Attribute-Based Encryption Schemes","authors":"Je-Kuan Lin, Wun-Ting Lin, Jake Wu","doi":"10.3390/cryptography7020028","DOIUrl":"https://doi.org/10.3390/cryptography7020028","url":null,"abstract":"Currently, cloud computing has become increasingly popular and thus, many people and institutions choose to put their data into the cloud instead of local environments. Given the massive amount of data and the fidelity of cloud servers, adequate security protection and efficient retrieval mechanisms for stored data have become critical problems. Attribute-based encryption brings the ability of fine-grained access control and can achieve a direct encrypted data search while being combined with searchable encryption algorithms. However, most existing schemes only support single-keyword or provide no ranking searching results, which could be inflexible and inefficient in satisfying the real world’s actual needs. We propose a flexible multi-keyword ranked searchable attribute-based scheme using search trees to overcome the above-mentioned problems, allowing users to combine their fuzzy searching keywords with AND–OR logic gates. Moreover, our enhanced scheme not only improves its privacy protection but also goes a step further to apply a semantic search to boost the flexibility and the searching experience of users. With the proposed index-table method and the tree-based searching algorithm, we proved the efficiency and security of our schemes through a series of analyses and experiments.","PeriodicalId":13186,"journal":{"name":"IACR Trans. Cryptogr. Hardw. Embed. Syst.","volume":"39 1","pages":"28"},"PeriodicalIF":0.0,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85459183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Blockchain-Based Electronic Voting: A Secure and Transparent Solution 基于区块链的电子投票:一种安全透明的解决方案
Pub Date : 2023-05-15 DOI: 10.3390/cryptography7020027
Bruno Miguel Batista Pereira, J. M. Torres, P. Sobral, R. Moreira, C. Soares, Ivo Pereira
Since its appearance in 2008, blockchain technology has found multiple uses in fields such as banking, supply chain management, and healthcare. One of the most intriguing uses of blockchain is in voting systems, where the technology can overcome the security and transparency concerns that plague traditional voting systems. This paper provides a thorough examination of the implementation of a blockchain-based voting system. The proposed system employs cryptographic methods to protect voters’ privacy and anonymity while ensuring the verifiability and integrity of election results. Digital signatures, homomorphic encryption (He), zero-knowledge proofs (ZKPs), and the Byzantine fault-tolerant consensus method underpin the system. A review of the literature on the use of blockchain technology for voting systems supports the analysis and the technical and logistical constraints connected with implementing the suggested system. The study suggests solutions to problems such as managing voter identification and authentication, ensuring accessibility for all voters, and dealing with network latency and scalability. The suggested blockchain-based voting system can provide a safe and transparent platform for casting and counting votes, ensuring election results’ privacy, anonymity, and verifiability. The implementation of blockchain technology can overcome traditional voting systems’ security and transparency shortcomings while also delivering a high level of integrity and traceability.
自2008年问世以来,区块链技术在银行、供应链管理和医疗保健等领域得到了广泛应用。区块链最有趣的用途之一是在投票系统中,该技术可以克服困扰传统投票系统的安全和透明度问题。本文对基于区块链的投票系统的实现进行了全面的研究。该系统采用加密方法保护选民的隐私和匿名性,同时确保选举结果的可验证性和完整性。数字签名、同态加密(He)、零知识证明(ZKPs)和拜占庭容错共识方法是该系统的基础。对关于将区块链技术用于投票系统的文献的回顾支持了与实施建议系统相关的分析以及技术和后勤限制。该研究提出了诸如管理选民身份和认证、确保所有选民的可访问性以及处理网络延迟和可扩展性等问题的解决方案。建议的基于区块链的投票系统可以为投票和计票提供一个安全透明的平台,确保选举结果的隐私性、匿名性和可验证性。区块链技术的实施可以克服传统投票系统的安全性和透明度缺点,同时还可以提供高水平的完整性和可追溯性。
{"title":"Blockchain-Based Electronic Voting: A Secure and Transparent Solution","authors":"Bruno Miguel Batista Pereira, J. M. Torres, P. Sobral, R. Moreira, C. Soares, Ivo Pereira","doi":"10.3390/cryptography7020027","DOIUrl":"https://doi.org/10.3390/cryptography7020027","url":null,"abstract":"Since its appearance in 2008, blockchain technology has found multiple uses in fields such as banking, supply chain management, and healthcare. One of the most intriguing uses of blockchain is in voting systems, where the technology can overcome the security and transparency concerns that plague traditional voting systems. This paper provides a thorough examination of the implementation of a blockchain-based voting system. The proposed system employs cryptographic methods to protect voters’ privacy and anonymity while ensuring the verifiability and integrity of election results. Digital signatures, homomorphic encryption (He), zero-knowledge proofs (ZKPs), and the Byzantine fault-tolerant consensus method underpin the system. A review of the literature on the use of blockchain technology for voting systems supports the analysis and the technical and logistical constraints connected with implementing the suggested system. The study suggests solutions to problems such as managing voter identification and authentication, ensuring accessibility for all voters, and dealing with network latency and scalability. The suggested blockchain-based voting system can provide a safe and transparent platform for casting and counting votes, ensuring election results’ privacy, anonymity, and verifiability. The implementation of blockchain technology can overcome traditional voting systems’ security and transparency shortcomings while also delivering a high level of integrity and traceability.","PeriodicalId":13186,"journal":{"name":"IACR Trans. Cryptogr. Hardw. Embed. Syst.","volume":"74 1","pages":"27"},"PeriodicalIF":0.0,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84049328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PudgyTurtle Mode Resists Bit-Flipping Attacks pugyturtle模式抵抗比特翻转攻击
Pub Date : 2023-05-10 DOI: 10.3390/cryptography7020025
David A. August, Anne C. Smith
Cryptosystems employing a synchronous binary-additive stream cipher are susceptible to a generic attack called ’bit-flipping’, in which the ciphertext is modified to decrypt into a fraudulent message. While authenticated encryption and message authentication codes can effectively negate this attack, encryption modes can also provide partial protection against bit-flipping. PudgyTurtle is a stream-cipher mode which uses keystream to encode (via an error-correcting code) and to encipher (via modulo-2 addition). Here, we describe the behavior of this mode during bit-flipping attacks and demonstrate how it creates uncertainty about the number, positions, and identities of decrypted bits that will be affected.
采用同步二进制加性流密码的密码系统容易受到称为“比特翻转”的通用攻击,在这种攻击中,密文被修改以解密成欺诈性消息。虽然经过身份验证的加密和消息身份验证码可以有效地消除这种攻击,但加密模式也可以提供部分保护,防止比特翻转。PudgyTurtle是一种流密码模式,它使用keystream进行编码(通过纠错码)和加密(通过模-2加法)。在这里,我们描述了这种模式在比特翻转攻击期间的行为,并演示了它如何在受影响的解密比特的数量、位置和身份方面产生不确定性。
{"title":"PudgyTurtle Mode Resists Bit-Flipping Attacks","authors":"David A. August, Anne C. Smith","doi":"10.3390/cryptography7020025","DOIUrl":"https://doi.org/10.3390/cryptography7020025","url":null,"abstract":"Cryptosystems employing a synchronous binary-additive stream cipher are susceptible to a generic attack called ’bit-flipping’, in which the ciphertext is modified to decrypt into a fraudulent message. While authenticated encryption and message authentication codes can effectively negate this attack, encryption modes can also provide partial protection against bit-flipping. PudgyTurtle is a stream-cipher mode which uses keystream to encode (via an error-correcting code) and to encipher (via modulo-2 addition). Here, we describe the behavior of this mode during bit-flipping attacks and demonstrate how it creates uncertainty about the number, positions, and identities of decrypted bits that will be affected.","PeriodicalId":13186,"journal":{"name":"IACR Trans. Cryptogr. Hardw. Embed. Syst.","volume":"13 1 1","pages":"25"},"PeriodicalIF":0.0,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90253729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revisiting Multiple Ring Oscillator-Based True Random Generators to Achieve Compact Implementations on FPGAs for Cryptographic Applications 基于多环振荡器的真随机发生器在fpga上实现密码学应用的紧凑实现
Pub Date : 2023-05-10 DOI: 10.3390/cryptography7020026
L. Parrilla, Antonio García, Encarnación Castillo, J. A. López-Ramos, U. Meyer-Baese
The generation of random numbers is crucial for practical implementations of cryptographic algorithms. In this sense, hardware security modules (HSMs) include true random number generators (TRNGs) implemented in hardware to achieve good random number generation. In the case of cryptographic algorithms implemented on FPGAs, the hardware implementation of RNGs is limited to the programmable cells in the device. Among the different proposals to obtain sources of entropy and process them to implement TRNGs, those based in ring oscillators (ROs), operating in parallel and combined with XOR gates, present good statistical properties at the cost of high area requirements. In this paper, these TRNGs are revisited, showing a method for area optimization independently of the FPGA technology used. Experimental results show that three ring oscillators requiring only three LUTs are enough to build a TRNG on Artix 7 devices from Xilinx with a throughput of 33.3 Kbps, which passes NIST tests. A throughput of 50 Kbps can be achieved with four ring oscillators, also requiring three LUTs in Artix 7 devices, while 100 Kbps can be achieved using an structure with four ring oscillators requiring seven LUTs.
随机数的生成对于密码学算法的实际实现至关重要。从这个意义上说,硬件安全模块(hsm)包括在硬件中实现的真随机数生成器(trng),以实现良好的随机数生成。在fpga上实现加密算法的情况下,rng的硬件实现仅限于设备中的可编程单元。在获取熵源并对其进行处理以实现TRNGs的不同方案中,基于环形振荡器(ROs)、并联工作并与异或门相结合的方案具有良好的统计性能,但代价是面积要求高。在本文中,这些trng被重新审视,展示了一种独立于所使用的FPGA技术的面积优化方法。实验结果表明,仅需三个lut的三个环形振荡器就足以在Xilinx Artix 7器件上构建TRNG,吞吐量为33.3 Kbps,通过了NIST测试。使用4个环形振荡器可以实现50 Kbps的吞吐量,在第7条器件中也需要3个lut,而使用4个环形振荡器需要7个lut的结构可以实现100 Kbps。
{"title":"Revisiting Multiple Ring Oscillator-Based True Random Generators to Achieve Compact Implementations on FPGAs for Cryptographic Applications","authors":"L. Parrilla, Antonio García, Encarnación Castillo, J. A. López-Ramos, U. Meyer-Baese","doi":"10.3390/cryptography7020026","DOIUrl":"https://doi.org/10.3390/cryptography7020026","url":null,"abstract":"The generation of random numbers is crucial for practical implementations of cryptographic algorithms. In this sense, hardware security modules (HSMs) include true random number generators (TRNGs) implemented in hardware to achieve good random number generation. In the case of cryptographic algorithms implemented on FPGAs, the hardware implementation of RNGs is limited to the programmable cells in the device. Among the different proposals to obtain sources of entropy and process them to implement TRNGs, those based in ring oscillators (ROs), operating in parallel and combined with XOR gates, present good statistical properties at the cost of high area requirements. In this paper, these TRNGs are revisited, showing a method for area optimization independently of the FPGA technology used. Experimental results show that three ring oscillators requiring only three LUTs are enough to build a TRNG on Artix 7 devices from Xilinx with a throughput of 33.3 Kbps, which passes NIST tests. A throughput of 50 Kbps can be achieved with four ring oscillators, also requiring three LUTs in Artix 7 devices, while 100 Kbps can be achieved using an structure with four ring oscillators requiring seven LUTs.","PeriodicalId":13186,"journal":{"name":"IACR Trans. Cryptogr. Hardw. Embed. Syst.","volume":"33 1","pages":"26"},"PeriodicalIF":0.0,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73964528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
LACT+: Practical Post-Quantum Scalable Confidential Transactions LACT+:实用的后量子可扩展机密交易
Pub Date : 2023-05-08 DOI: 10.3390/cryptography7020024
J. Alupotha, Xavier Boyen, Matthew Mckague
A “confidential monetary value” carries information about the real monetary value but does not disclose it. Post-quantum private blockchains with confidential monetary values—large-sized blockchains with large verification times—have the least scalability because they need to save and verify more information than those with “plain-text monetary values”. High scalability is an essential security requirement for decentralized blockchain payment systems because the more honest peers who can afford to verify the blockchain copies are, the higher the security. We propose a quantum-safe transaction protocol for confidential monetary blockchains, LACT+ (Lattice-based Aggregable Confidential Transactions), which is more scalable than previous post-quantum confidential blockchains, i.e., many input/output transactions with logarithmic sized complexity.
“保密货币价值”包含有关真实货币价值的信息,但不披露它。具有机密货币价值的后量子私有区块链-具有大量验证时间的大型区块链-具有最小的可扩展性,因为它们需要比具有“明文货币价值”的区块链保存和验证更多的信息。高可扩展性是去中心化区块链支付系统的基本安全要求,因为有能力验证区块链副本的诚实对等体越多,安全性就越高。我们提出了一种用于机密货币区块链的量子安全交易协议LACT+(基于晶格的可聚合机密交易),它比以前的后量子机密区块链更具可扩展性,即许多具有对数大小复杂性的输入/输出交易。
{"title":"LACT+: Practical Post-Quantum Scalable Confidential Transactions","authors":"J. Alupotha, Xavier Boyen, Matthew Mckague","doi":"10.3390/cryptography7020024","DOIUrl":"https://doi.org/10.3390/cryptography7020024","url":null,"abstract":"A “confidential monetary value” carries information about the real monetary value but does not disclose it. Post-quantum private blockchains with confidential monetary values—large-sized blockchains with large verification times—have the least scalability because they need to save and verify more information than those with “plain-text monetary values”. High scalability is an essential security requirement for decentralized blockchain payment systems because the more honest peers who can afford to verify the blockchain copies are, the higher the security. We propose a quantum-safe transaction protocol for confidential monetary blockchains, LACT+ (Lattice-based Aggregable Confidential Transactions), which is more scalable than previous post-quantum confidential blockchains, i.e., many input/output transactions with logarithmic sized complexity.","PeriodicalId":13186,"journal":{"name":"IACR Trans. Cryptogr. Hardw. Embed. Syst.","volume":"1 1","pages":"24"},"PeriodicalIF":0.0,"publicationDate":"2023-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75979502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neural Crypto-Coding Based Approach to Enhance the Security of Images over the Untrusted Cloud Environment 基于神经密码编码的增强不可信云环境下图像安全性的方法
Pub Date : 2023-05-04 DOI: 10.3390/cryptography7020023
Pallavi Kulkarni, Rajashri Khanai, Dattaprasad Torse, N. Iyer, Gururaj Bindagi
The cloud provides on-demand, high-quality services to its users without the burden of managing hardware and software. Though the users benefit from the remote services provided by the cloud, they do not have their personal data in their physical possession. This certainly poses new security threats for personal and confidential data, bringing the focus back on trusting the use of the cloud for sensitive data. The benefits of the cloud outweigh the concerns raised earlier, and with an increase in cloud usage, it becomes more important for security services to evolve in order to address the ever-changing threat landscape. Advanced encryption standard (AES), being one of the most widely used encryption techniques, has inherent disadvantages related to the secret key that is shared, and predictable patterns in subkey generation. In addition, since cloud storage involves data transfer over a wireless channel, it is important to address the effect of noise and multipath propagation on the transmitted data. Catering to this problem, we propose a new approach—the secure and reliable neural cryptcoding (SARNC) technique—which provides a superior algorithm, dealing with better encryption techniques combined with channel coding. A chain is as strong as the weakest link and, in the case of symmetric key encryption, the weakest link is the shared key. In order to overcome this limitation, we propose an approach wherein the key used for cryptographic purposes is different from the key shared between the sender and the receiver. The shared key is used to derive the secret private key, which is generated by the neural key exchange protocol. In addition, the proposed approach emphasizes strengthening the sub-key generation process and integrating advanced encryption standard (AES) with low-density parity check (LDPC) codes to provide end-to-end security and reliability over wireless channels. The proposed technique was tested against research done in related areas. A comparative study shows a significant improvement in PSNR, MSE, and the structural similarity index (SSIM). The key strength analysis was carried out to understand the strength and weaknesses of the keys generated.
云为用户提供按需、高质量的服务,而无需管理硬件和软件。尽管用户受益于云提供的远程服务,但他们并没有实际拥有自己的个人数据。这无疑给个人和机密数据带来了新的安全威胁,使人们重新关注对敏感数据使用云的信任。云计算的好处超过了之前提出的担忧,随着云使用的增加,为了应对不断变化的威胁环境,安全服务的发展变得更加重要。高级加密标准(AES)是使用最广泛的加密技术之一,它在共享密钥和子密钥生成的可预测模式方面存在固有的缺点。此外,由于云存储涉及通过无线信道传输数据,因此解决噪声和多径传播对传输数据的影响非常重要。针对这个问题,我们提出了一种新的方法——安全可靠的神经密码编码(SARNC)技术,它提供了一种优越的算法,可以处理与信道编码相结合的更好的加密技术。一条链的强度与最弱的环节一样大,在对称密钥加密的情况下,最弱的环节是共享密钥。为了克服这一限制,我们提出了一种方法,其中用于加密目的的密钥与发送方和接收方之间共享的密钥不同。使用共享密钥派生秘密私钥,由神经密钥交换协议生成。此外,该方法强调加强子密钥生成过程,并将高级加密标准(AES)与低密度奇偶校验(LDPC)码集成在一起,以提供无线信道上的端到端安全性和可靠性。所提出的技术经过了相关领域研究的检验。对比研究表明,PSNR、MSE和结构相似指数(SSIM)均有显著改善。进行密钥强度分析,了解生成的密钥的优缺点。
{"title":"Neural Crypto-Coding Based Approach to Enhance the Security of Images over the Untrusted Cloud Environment","authors":"Pallavi Kulkarni, Rajashri Khanai, Dattaprasad Torse, N. Iyer, Gururaj Bindagi","doi":"10.3390/cryptography7020023","DOIUrl":"https://doi.org/10.3390/cryptography7020023","url":null,"abstract":"The cloud provides on-demand, high-quality services to its users without the burden of managing hardware and software. Though the users benefit from the remote services provided by the cloud, they do not have their personal data in their physical possession. This certainly poses new security threats for personal and confidential data, bringing the focus back on trusting the use of the cloud for sensitive data. The benefits of the cloud outweigh the concerns raised earlier, and with an increase in cloud usage, it becomes more important for security services to evolve in order to address the ever-changing threat landscape. Advanced encryption standard (AES), being one of the most widely used encryption techniques, has inherent disadvantages related to the secret key that is shared, and predictable patterns in subkey generation. In addition, since cloud storage involves data transfer over a wireless channel, it is important to address the effect of noise and multipath propagation on the transmitted data. Catering to this problem, we propose a new approach—the secure and reliable neural cryptcoding (SARNC) technique—which provides a superior algorithm, dealing with better encryption techniques combined with channel coding. A chain is as strong as the weakest link and, in the case of symmetric key encryption, the weakest link is the shared key. In order to overcome this limitation, we propose an approach wherein the key used for cryptographic purposes is different from the key shared between the sender and the receiver. The shared key is used to derive the secret private key, which is generated by the neural key exchange protocol. In addition, the proposed approach emphasizes strengthening the sub-key generation process and integrating advanced encryption standard (AES) with low-density parity check (LDPC) codes to provide end-to-end security and reliability over wireless channels. The proposed technique was tested against research done in related areas. A comparative study shows a significant improvement in PSNR, MSE, and the structural similarity index (SSIM). The key strength analysis was carried out to understand the strength and weaknesses of the keys generated.","PeriodicalId":13186,"journal":{"name":"IACR Trans. Cryptogr. Hardw. Embed. Syst.","volume":"116 1","pages":"23"},"PeriodicalIF":0.0,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84303877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Anonymous Homomorphic IBE with Application to Anonymous Aggregation 匿名同态IBE及其在匿名聚合中的应用
Pub Date : 2023-04-17 DOI: 10.3390/cryptography7020022
Michael Clear, H. Tewari
All anonymous identity-based encryption (IBE) schemes that are group homomorphic (to the best of our knowledge) require knowledge of the identity to compute the homomorphic operation. This paper is motivated by this open problem, namely to construct an anonymous group-homomorphic IBE scheme that does not sacrifice anonymity to perform homomorphic operations. Note that even when strong assumptions, such as indistinguishability obfuscation (iO), are permitted, no schemes are known. We succeed in solving this open problem by assuming iO and the hardness of the DBDH problem over rings (specifically, ZN2 for RSA modulus N). We then use the existence of such a scheme to construct an IBE scheme with re-randomizable anonymous encryption keys, which we prove to be IND-ID-RCCA secure. Finally, we use our results to construct identity-based anonymous aggregation protocols.
所有匿名的基于身份的加密(IBE)方案都是群同态的(据我们所知),需要知道身份才能计算同态操作。本文正是受此开放问题的启发,构造一个不牺牲匿名性来进行同态操作的匿名群同态IBE方案。请注意,即使在允许不可区分混淆(iO)等强假设的情况下,也没有已知的方案。我们通过假设iO和环上DBDH问题的硬度(特别是RSA模N的ZN2)成功地解决了这个开放问题。然后我们利用该方案的存在性构造了一个具有可重新随机的匿名加密密钥的IBE方案,我们证明了该方案是IND-ID-RCCA安全的。最后,我们使用我们的结果来构建基于身份的匿名聚合协议。
{"title":"Anonymous Homomorphic IBE with Application to Anonymous Aggregation","authors":"Michael Clear, H. Tewari","doi":"10.3390/cryptography7020022","DOIUrl":"https://doi.org/10.3390/cryptography7020022","url":null,"abstract":"All anonymous identity-based encryption (IBE) schemes that are group homomorphic (to the best of our knowledge) require knowledge of the identity to compute the homomorphic operation. This paper is motivated by this open problem, namely to construct an anonymous group-homomorphic IBE scheme that does not sacrifice anonymity to perform homomorphic operations. Note that even when strong assumptions, such as indistinguishability obfuscation (iO), are permitted, no schemes are known. We succeed in solving this open problem by assuming iO and the hardness of the DBDH problem over rings (specifically, ZN2 for RSA modulus N). We then use the existence of such a scheme to construct an IBE scheme with re-randomizable anonymous encryption keys, which we prove to be IND-ID-RCCA secure. Finally, we use our results to construct identity-based anonymous aggregation protocols.","PeriodicalId":13186,"journal":{"name":"IACR Trans. Cryptogr. Hardw. Embed. Syst.","volume":"68 1","pages":"22"},"PeriodicalIF":0.0,"publicationDate":"2023-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89922510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IACR Trans. Cryptogr. Hardw. Embed. Syst.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1