Can Ternary Computing Improve Information Assurance?
AbstractModern computer microarchitectures build on well-established foundations that have encouraged a pattern of computational homogeneity that many cyberattacks depend on. We suggest that balanced ternary logic can be valuable to Internet of Things (IoT) security, authentication of connected vehicles, as well as hardware and software assurance, and have developed a ternary encryption scheme between a computer and smartcard based on public key exchange through non-secure communication channels to demonstrate the value of balanced ternary systems. The concurrent generation of private keys by the computer and the smartcard uses ternary schemes and cryptographic primitives such as ternary physical unclonable functions. While general purpose ternary computers have not succeeded in general use, heterogeneous computing systems with small ternary computing units dedicated to cryptographic functions have the potential to improve information assurance, and may also be designed to execute binary legacy codes. View Full-Text
Share & Cite This Article
Cambou, B.; Flikkema, P.G.; Palmer, J.; Telesca, D.; Philabaum, C. Can Ternary Computing Improve Information Assurance? Cryptography 2018, 2, 6.
Cambou B, Flikkema PG, Palmer J, Telesca D, Philabaum C. Can Ternary Computing Improve Information Assurance? Cryptography. 2018; 2(1):6.Chicago/Turabian Style
Cambou, Bertrand; Flikkema, Paul G.; Palmer, James; Telesca, Donald; Philabaum, Christopher. 2018. "Can Ternary Computing Improve Information Assurance?" Cryptography 2, no. 1: 6.
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.