Special Issue "Physical Security in a Cryptographic Enviroment"

A special issue of Cryptography (ISSN 2410-387X).

Deadline for manuscript submissions: closed (31 December 2017)

Special Issue Editor

Guest Editor
Prof. Dr. Wael Adi

IDA, Institute of Computer and Network Engineering, Technische Universitaet Braunschweig, Hans-Sommer Str. 66, D-38106 Braunschweig, Germany
Website | E-Mail
Phone: +49 531 391 5298
Fax: +49 531 391 5296
Interests: physical security; unclonable and clone-resistant architectures; intellectual property right protection for VLSI design cores; robot security; vehicular security; e-money; e-voting and error correction techniques

Special Issue Information

Dear Colleagues,

Physical security in cryptographic systems is an interdisciplinary and basic research area. In general, treating the physical properties of participating entities jointly with the cryptographic schemes involved is a complex issue due to its interdisciplinary nature. Physical Unclonable Functions (PUFs), as one such technology, have been introduced in the last two decades to fabricate physically unclonable units. Unclonable or non-replaceable physical units, in fact, represent a basic security anchor for resilient security systems. Emerging IoT (Internet of Things) and the contemporary efforts towards developing Smart Homes and Smart Cities—involving human beings, devices, structures and virtually “everything”—represent a great interdisciplinary challenge facing the security research community. The tendency towards worldwide global networking of “virtually everything” opens new, very essential security-relevant issues. System designers face unlimited borderless participating entities dealing with different state regulations and a variety of forensic, political and even cultural issues. Publications concerning physical security in the cryptographic environment is still far behind that of intensively-treated “soft” cryptographic techniques in public literature. One ultimate goal of physical security is to attain the same level as biological system security, which is still seen as the most robust physical security ever known. Bio-inspired security can therefore be seen as a good reference for physical security in modern systems. Biometrics have successfully been integrated in modern security systems. Mechatronic systems, and especially automotive systems demand ever higher “mechatronic security” techniques which are still far from being ready for real field applications.

This Special Issue on physical security is a step to stimulate more open scientific discussions on all issues related to this challenging topic.

Prof. Dr. Wael Adi
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Cryptography is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) is waived for well-prepared manuscripts submitted to this issue. Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Physical Cryptographic Security
  • Physically Unclonable Functions (PUFs)
  • Unclonable or Clone-Resistant Units/Devices/Entities
  • Unclonable or Clone-Resistant Structures
  • Side-Channel Attacks
  • Physical Security of Cryptographic Schemes
  • Bio-Inspired Security
  • Provable Physical Uniqueness
  • Automotive Physical security
  • Mechatronic Security
  • Biometric Security
  • Intellectual Property Protection

Published Papers (3 papers)

View options order results:
result details:
Displaying articles 1-3
Export citation of selected articles as:

Research

Open AccessFeature PaperArticle Robust Secure Authentication and Data Storage with Perfect Secrecy
Received: 29 January 2018 / Revised: 23 March 2018 / Accepted: 6 April 2018 / Published: 10 April 2018
PDF Full-text (876 KB) | HTML Full-text | XML Full-text
Abstract
We consider an authentication process that makes use of biometric data or the output of a physical unclonable function (PUF), respectively, from an information theoretical point of view. We analyse different definitions of achievability for the authentication model. For the secrecy of the
[...] Read more.
We consider an authentication process that makes use of biometric data or the output of a physical unclonable function (PUF), respectively, from an information theoretical point of view. We analyse different definitions of achievability for the authentication model. For the secrecy of the key generated for authentication, these definitions differ in their requirements. In the first work on PUF based authentication, weak secrecy has been used and the corresponding capacity regions have been characterized. The disadvantages of weak secrecy are well known. The ultimate performance criteria for the key are perfect secrecy together with uniform distribution of the key. We derive the corresponding capacity region. We show that, for perfect secrecy and uniform distribution of the key, we can achieve the same rates as for weak secrecy together with a weaker requirement on the distribution of the key. In the classical works on PUF based authentication, it is assumed that the source statistics are known perfectly. This requirement is rarely met in applications. That is why the model is generalized to a compound model, taking into account source uncertainty. We also derive the capacity region for the compound model requiring perfect secrecy. Additionally, we consider results for secure storage using a biometric or PUF source that follow directly from the results for authentication. We also generalize known results for this problem by weakening the assumption concerning the distribution of the data that shall be stored. This allows us to combine source compression and secure storage. Full article
(This article belongs to the Special Issue Physical Security in a Cryptographic Enviroment)
Figures

Figure 1

Open AccessArticle Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT
Received: 22 December 2017 / Revised: 19 January 2018 / Accepted: 2 February 2018 / Published: 7 February 2018
PDF Full-text (837 KB) | HTML Full-text | XML Full-text
Abstract
The threat of quantum-computer-assisted cryptanalysis is forcing the security community to develop new types of security protocols. These solutions must be secure against classical and post-quantum cryptanalysis techniques as well as feasible for all kinds of devices, including energy-restricted Internet of Things (IoT)
[...] Read more.
The threat of quantum-computer-assisted cryptanalysis is forcing the security community to develop new types of security protocols. These solutions must be secure against classical and post-quantum cryptanalysis techniques as well as feasible for all kinds of devices, including energy-restricted Internet of Things (IoT) devices. The quantum immunity can be implemented in the cryptographic layer, e.g., by using recent lattice-based key exchange algorithms NewHope or Frodo, or in the physical layer of wireless communication, by utilizing eavesdropping-resistant secrecy coding techniques. In this study, we explore and compare the feasibility and energy efficiency of selected cryptographic layer and physical layer approaches by applying an evaluation approach that is based on simulation and modeling. In particular, we consider NewHope and Frodo key exchange algorithms as well as novel physical layer secrecy coding approach that is based on polar codes. The results reveal that our proposed physical layer implementation is very competitive with respect to the cryptographic solutions, particularly in short-range wireless communication. We also observed that the total energy consumption is unequally divided between transmitting and receiving devices in all the studied approaches. This may be an advantage when designing security architectures for energy-restricted devices. Full article
(This article belongs to the Special Issue Physical Security in a Cryptographic Enviroment)
Figures

Figure 1

Open AccessArticle A Privacy-Preserving, Mutual PUF-Based Authentication Protocol
Received: 5 October 2016 / Revised: 11 November 2016 / Accepted: 22 November 2016 / Published: 25 November 2016
Cited by 5 | PDF Full-text (3758 KB) | HTML Full-text | XML Full-text
Abstract
This paper describes an authentication protocol using a Hardware-Embedded Delay PUF called HELP. HELP derives randomness from within-die path delay variations that occur along the paths within a hardware implementation of a cryptographic primitive, such as AES or SHA-3. The digitized timing values
[...] Read more.
This paper describes an authentication protocol using a Hardware-Embedded Delay PUF called HELP. HELP derives randomness from within-die path delay variations that occur along the paths within a hardware implementation of a cryptographic primitive, such as AES or SHA-3. The digitized timing values which represent the path delays are stored in a database on a secure server (verifier) as an alternative to storing PUF response bitstrings. This enables the development of an efficient authentication protocol that provides both privacy and mutual authentication. The security properties of the protocol are analyzed using data collected from a set of Xilinx Zynq FPGAs. Full article
(This article belongs to the Special Issue Physical Security in a Cryptographic Enviroment)
Figures

Figure 1

Back to Top