Next Article in Journal
An Overview of DRAM-Based Security Primitives
Previous Article in Journal
Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT
Article Menu

Export Article

Open AccessArticle
Cryptography 2018, 2(1), 6; https://doi.org/10.3390/cryptography2010006

Can Ternary Computing Improve Information Assurance?

1
School of Informatics, Computing and Cyber Systems, Northern Arizona University, SICCS Building, Flagstaff, AZ 86011, USA
2
Air Force Research Laboratories, 26 Electronics Parkwa, Rome, NY 13441, USA
*
Author to whom correspondence should be addressed.
Received: 18 January 2018 / Revised: 17 February 2018 / Accepted: 27 February 2018 / Published: 2 March 2018
Full-Text   |   PDF [8664 KB, uploaded 2 March 2018]   |  

Abstract

Modern computer microarchitectures build on well-established foundations that have encouraged a pattern of computational homogeneity that many cyberattacks depend on. We suggest that balanced ternary logic can be valuable to Internet of Things (IoT) security, authentication of connected vehicles, as well as hardware and software assurance, and have developed a ternary encryption scheme between a computer and smartcard based on public key exchange through non-secure communication channels to demonstrate the value of balanced ternary systems. The concurrent generation of private keys by the computer and the smartcard uses ternary schemes and cryptographic primitives such as ternary physical unclonable functions. While general purpose ternary computers have not succeeded in general use, heterogeneous computing systems with small ternary computing units dedicated to cryptographic functions have the potential to improve information assurance, and may also be designed to execute binary legacy codes. View Full-Text
Keywords: authentication; hardware security; tamper-resistant designs; cryptography; information assurance; ternary computing authentication; hardware security; tamper-resistant designs; cryptography; information assurance; ternary computing
Figures

Graphical abstract

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Cambou, B.; Flikkema, P.G.; Palmer, J.; Telesca, D.; Philabaum, C. Can Ternary Computing Improve Information Assurance? Cryptography 2018, 2, 6.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Cryptography EISSN 2410-387X Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top