Next Article in Journal
An Alternative Diffie-Hellman Protocol
Previous Article in Journal
Acknowledgement to Reviewers of Cryptography in 2019
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Low-Complexity Nonlinear Self-Inverse Permutation for Creating Physically Clone-Resistant Identities

Institute of Computer and Network Engineering, Technische Universität Braunschweig, 38106 Braunschweig, Germany
*
Author to whom correspondence should be addressed.
Cryptography 2020, 4(1), 6; https://doi.org/10.3390/cryptography4010006
Submission received: 28 November 2019 / Revised: 19 January 2020 / Accepted: 25 January 2020 / Published: 25 February 2020

Abstract

:
New large classes of permutations over 2 n based on T-Functions as Self-Inverting Permutation Functions (SIPFs) are presented. The presented classes exhibit negligible or low complexity when implemented in emerging FPGA technologies. The target use of such functions is in creating the so called Secret Unknown Ciphers (SUC) to serve as resilient Clone-Resistant structures in smart non-volatile Field Programmable Gate Arrays (FPGA) devices. SUCs concepts were proposed a decade ago as digital consistent alternatives to the conventional analog inconsistent Physical Unclonable Functions PUFs. The proposed permutation classes are designed and optimized particularly to use non-consumed Mathblock cores in programmable System-on-Chip (SoC) FPGA devices. Hardware and software complexities for realizing such structures are optimized and evaluated for a sample expected target FPGA technology. The attained security levels of the resulting SUCs are evaluated and shown to be scalable and usable even for post-quantum crypto systems.

1. Introduction

The demand for a more efficient and secure physical identification of the participating entities in a security architecture is a permanent technological need. Unclonable physical identities are emerging to play a crucial role in contemporary and future security systems such as those dealing with smart houses, smart cities, smart healthcare, etc. [1]. In the last two decades, many physical identification approaches have been proposed based on simply verifying a stored secret key in an embedded non-volatile memory (NVM) [2]. This approach is inherently cloneable as somebody knows the stored secret keys. moreover, it mostly failed to face simple replacements/physical attacks [3]. A more sophisticated approach was proposed based on “unknown” Physical Unclonable Functions (PUFs) serving as a physically unclonable identity for RFIDs, smart cards, mobile devices, and, generally, the Internet of Things (IoT) devices [2]. PUFs use intrinsic properties of electronic device structures which cannot be manufactured to become identical and is comparable to a borne biological DNA. PUFs properties are fully random, obscure, and unpredictable. Therefore, PUFs are theoretically considered as unknown functions that are impossible to clone [4]. However, all PUFs share the same property of being inconsistent as unknown continuous “analog” mappings.
Our proposed “digital” Secret Unknown Cipher (SUC) concept was introduced a decade ago in [5] as electronic DNA (e-DNA). SUCs physical modules compared to PUFs, are highly consistent as pure digital structures. SUCs are considered as “clone-resistant digital functions” that can be realized as digital structures. SUCs are self-created and embedded within off-shelf System on Chip (SoC) Field Programmable Gate Arrays (FPGA) devices in a post-fabrication process, where the device manufacturer can be excluded from the security process. This work shows a possible approach towards creating such SUCs in emerging future SoC FPGA technologies. The particular property of the proposed cipher classes for SUC is that they use existing unused-arithmetic-hardcore-modules that are already available in most modern FPGA resources.
The main contributions of this work are in devising a new technique for converting future smart programmable VLSI devices into physically hard-to-clone units as an alternative to conventional PUF technologies. The technique is based on a new concept in creating permanent and highly resilient digital SUC. Therefore, new special huge classes of FPGA-optimized ciphers are introduced based on low-cost self-inverse permutation functions deploying special FPGA arithmetic-hardwired-cores. The targeted VLSI technologies are emerging future smart self-reconfiguring and non-volatile SoC FPGA devices to accommodate the proposed SUC-modules. Such technologies are expected to emerge in the near future. The paper introduces a new unknown cipher generator based on new self-inverse permutations to construct digital SUCs to replace the inconsistent analog PUFs in a large class of applications.
The paper is organized as follows.
  • The state of the art of PUFs as recently used unknown functions in Section 2. Other proposals of unknown functions were carefully reviewed in [6].
  • In Section 3, the creation process of SUCs is presented in more details to make the paper self-contained.
  • Then the basic algebra to be deployed for cipher construction is defined based on an expected future VLSI environment in Section 4.
  • In Section 5, Section 6 and Section 7, the novel found large classes of self-inverse permutations over 2 n are introduced.
  • In Section 8, the hardware implementation complexities are evaluated.
  • Finally, the resulting cipher structures and their attained security levels are discussed in Section 9.
  • Section 10 concludes the results.

2. Background Motivation and State of the Art on Physical Unclonability

Tremendous research efforts were conducted two decades ago to create unclonable entities. The conventional Physical Unclonable Functions (PUFs) as technologies to make physical units unclonable were introduced in the last two decades such as in [2,7,8]. A PUF was first introduced as a physical one-way function in an optical environment [9]. Then, the PUF was proposed as a controlled physical random function in [10]. Later, the PUF was defined as an unknown function [11]. Several electronic PUFs were presented such as ring oscillator PUFs [10,12], TERO-PUF [13], arbiter PUFs [14], Chaos-based PUFs [15], etc. Furthermore, PUFs were classified into two categories: If a PUF can produce an enormous number of input-output pairs (challenge-response pairs (CR-pairs)), then it is assigned as a Strong PUF. Otherwise, the PUF is assigned as a weak PUF if it produces a limited number of CR-pairs [2].
In the following sections, several proposals deploying PUFs are selected to be reviewed as being related to our work. The following technical discussions cover also PUF-vulnerabilities, as well as modeling attacks, as the most important threats facing PUF technologies.

2.1. PUFs Drawbacks and Disadvantages

As nonlinear and unknown analog mappings, most PUFs output responses cannot be perfectly reproducible for the same input stimuli. Such a response inconsistency occurs due to many reasons such as environmental perturbations such as supply voltage, noise, operation temperature, aging, and many other specific effects. The PUF-Drawbacks can be classified as follows [2]:
  • Inconsistent input-output behavior and consequently inconsistency in the PUF’s CR-pairs reproducibility.
In addition to two mainly security drawbacks, namely:
2.
Possible correlations in PUF CR-pairs allowing modeling attacks.
3.
A limited or small number of possible distinct CR-pairs which simplifies cloning attacks.

2.2. Counteracting the Drawbacks of PUFs

Several PUF-improvements were presented to overcome PUF-drawbacks to make them more robust, reliable and secure. Such improvements were conducted in [16,17,18,19,20] based on error-correction techniques and/or combining PUFs with additional cryptographic primitives.
To counteract PUF-inconsistency drawbacks, complex fuzzy extractors were introduced as a remedy [21]. Such fuzzy extractors deploy Helper Data Algorithm (HDA) and/or error correction code (ECC) procedures to stabilize the PUF’s inconsistent responses. As a result, the need for a fuzzy extractor makes most of the proposed PUFs very costly to implement with more latency counteracting most requirements of a lightweight design. For instance, the proposed fuzzy extractor of [20] requires 5.1 times of the PUF’s resources to produce more consistent responses.
Correlation drawbacks allow several security threats against PUF technology. Recently, modeling attacks were considered among the most important PUF-threats. The highly correlated PUF CR-pairs lead to building predictive models of the PUFs [22,23,24,25]. The general methods of modeling attacks on PUFs can be concluded as follows:
  • Modeling Attack using Machine Learning (ML) Algorithms: New PUF attacks based on modeling by machine learning (ML) were found as in [22] with alarming high prediction rates approaching 99%. The predictive models using ML techniques of various proposals of delay PUF are constructed with error ratios [22]: less than 1% for Arbiter PUFs, 1% for XOR Arbiter PUFs, 4.5% for Feed-Forward Arbiter PUFs, and less than 1% for Ring Oscillator PUFs.
  • Modeling Attack using PUF-Codebook: Several PUFs generates a limited number of CRPs [2]. For instance, Ring Oscillator PUFs produce a quadratic number of CRPs. Therefore, an adversary can produce a codebook of the PUF containing a look-up table of all CRPs to imitate the PUF [23].
For instance and in reference to Figure 1a, a controlled PUF was proposed by combining a random hash function with a weak PUF to prevent modeling attacks in [10]. As also HDA is still required, the resulting overall high complexity is mostly not acceptable for practical use.
In reference to Figure 1b and according to [26], a PUF-based unknown key generation was proposed. The proposed mapping structure uses a PUF as a key generator and Pseudorandom Function (PRF) as input-output mapping resulting with large usable operational space with no correlation and large usable distinct pairs. Again, complex HDA is required resulting with overall non-attractive high-complexity for practical use.
In reference to Figure 1c and according to [20] using a weak PUF with a lattice cryptographic algorithm and a linear-feedback shift register (LFSR) combined to construct a strong PUF. The LFSR-connection polynomial is used to expand the PUF’s CR-space, where the lattice mapping counteracts machine learning attacks.

2.3. PUFs Use-Cases and Their Weaknesses

Several PUF- based authentication protocols have been presented. For instance, a delay PUF was deployed as a key generator in an anonymous e-money transaction protocol [27]. In [28], PUF is proposed for a RFID-authentication protocol. Here, the designed protocol requires an extra hash function and the proposed PUF needs to exchange extra data with the server to attain a stable response. In [7], resource-constrained Internet of things (IoT) devices deploying PUF were studied and analyzed. PUFs were introduced as a lightweight solution to ensure secure communications among IoT devices. Unfortunately, the results showed that most of PUF proposals need at least an extra cryptographic algorithm or secure memory to perform the authentication protocols. This need for cryptographic primitives increases the required energy and computational resources for performing PUF-based authentication protocols. In [2], nineteen PUF-based authentication protocols have been studied and analyzed. The results showed that most PUFs are not resilient against modeling attacks, most PUF CR-space requires expanding to be sufficiently large for the entity authentication, and CR-pairs management is very costly due to collision-prone properties of all PUF-mappings.

2.4. Recent Alternatives to Analog PUFs

The SUC concept as an alternative full-digital substitute to the analog PUF was proposed by the authors a decade ago in the public literature as in [5,11]. SUCs, as pure digital structures are ultimately consistent [29]. Additionally, SUCs as designed invertible PRFs offer full usage of the whole 2n input-output pairs as plaintext-ciphertext pairs, where, n is the cipher input size.
A possible SUCs creation scenario as Feistel-like ciphers was presented recently in [6]. Involutive SUC and non-involutive SUC classes were proposed in [30]. In [31], a new family of stream ciphers deploying non-linear feedback shift registers was proposed as a possible SUC class. In [32], SUC as a random stream cipher based on T-function was proposed. The current paper is presenting new generalized large classes of useful special low-cost self-inverse permutation mappings by deploying pure FPGA resources as arithmetic-cores based on T-functions for SUC constructions.
To show in a very simplified way the differences of our proposal to the somehow digitized analog PUFs with some relation to the SUC concept, the following two examples are depicted from the public literature.
Example 1.
In Figure 2a, the concept of a PUF-based unknown key generation was proposed to construct a strong PUF. In particular, a weak SRAM PUF is used as a key generator for a hardwired (AES) Advanced Encryption Standard cipher [19]. Note that the resulting virtual PUF’s input-output mapping is invertible. Therefore, it produces 2ninput-output pairs as plaintext-ciphertext pairs, where,nis the cipher input size. Again, HDA or equivalent techniques are still required to stabilize the noisy responses of the used SRAM PUF. The overall hardware complexity results with quite high complexity [19]. In comparison, our SUC solution on the right-side substitutes all required components with unknown digital structures. No complex fuzzy extractor with limited consistency is required. Therefore, the proposed SUC-structures meet the lightweight design requirements for mass products.
Example 2.
Figure 2b shows a proposed Feistel-like block cipher structure deploying PUFs to create an unknownffunction [33]. Note that a block cipher deploying PUFs to createfis equivalent to a block cipher with a secret unknown mapping allocated in the 4 x 4-bit SRAM-PUFs are utilized as unknown confusion functions. The resulting cipher is PRF with a fully usable input-output space, however, again is highly complex due to the use of HDA. The comparable SUC-structure on the right side is equivalent to our proposed SUC alternative as a key alternating cipher using unknown new T-function based arithmetic involutions as round functions as would be shown later on.
Notice that both examples are still using inconsistent analog PUFs with all the above-mentioned drawbacks and disadvantages.

3. The SUC Concept and Technology Background

The target of this section is to make the paper self-contained and better understandable for the reader, as SUC concept is not widely known in the public literature. This section is a slightly-modified copy of the Section 3 from our earlier publication [6] on SUC design techniques.
The unknown cipher concept is an entirely new security paradigm in the public literature. The unknown cipher here does not deal with protecting the communications or the links between at least two parties, as a sender and a receiver, which requires the cipher to be commonly known to both parties (Kerckhoffs’s principle). In particular, the SUC is fundamentally designed for the identification process to serve as a clone-resistant identity [5]. We postulate that “unclonability” is only possible if unknown structures are created. Therefore, a cipher designed to be embedded as a structure that is unknown to anybody (including its designer) does not violate Kerckhoffs’s principle. On the other hand, SUC should not be confused with “security by obscurity”, where the cipher is designed by a cryptographer, known to the manufacturer, and then kept secret and obscure.
SUC creation is a very challenging task. Figure 3 illustrates a possible SUC creation concept in a non-volatile (NV) FPGA device having internal self-reconfiguration capability. A large class of ciphers {E1, E2 … Eσ} are first created such that σ and offered for selection. Then, a single-event process triggers the FPGA-internal true random number generator (TRNG), leading to select randomly an unknown cipher choice Ej from the infinite number σ of the created distinct ciphers. A TRNG hardware module is offered in virtually all modern FPGA devices fulfilling the NIST state of the art standard cryptographic requirements (see TRNG-module specifications in the used FPGA [34] in our proposed prototyping). After this process, all the dashed entities in Figure 3 are then irreversibly killed and fully removed from the chip. The self-reconfiguration in the chip is then irreversibly locked (by a flash bit or fuse) to prohibit any repetition of that single-event SUC creation process. That is the created SUC is not more removable or changeable forever like a DNA. This concept was described intensively in the last decade in our old publications [5,29,35].
The resulting cipher is a secret, yet unknown, cipher and is a non-repeatable selection. It is even an unknown choice to the cipher designer/creator himself. The “Secret Unknown Cipher” (SUC) is realizable in an emerging VLSI device that allows self-creation of permanent unknown usable secret structures as “an electronic mutation”, as indicated in [36]. Note that for the functionality of the concept, there is no need to publish the SUC creation procedure/program of the cipher class, which is designated from now on as the “GENIE” as a smart cipher designer. However, for worst-case security analysis, we assume that the cipher creating “GENIE” is published.

3.1. Creation Concept of Unknown Ciphers as Clone-Resistant Entities/Modules

The proposed SUC is conceptually based on the following principle: “The only secret which can be kept unrevealed is the one which nobody knows” [37]. From a practical point of view, if the cipher creator itself cannot predict and foretell exactly the created cipher, then the cipher is considered as not known when the cipher class size σ .
Figure 4 illustrates a possible SUC creation that is assumed to be processed in a secure environment. The process may proceed as follows:
SUC creation phase:
  • A trusted authority (TA) injects one-time into a system-on-chip (SoC) device the software package “GENIE” as an SUC creator for a short time (as much time as required to create an unknown cipher, which is usually a few milliseconds).
  • Then, the GENIE is internally triggered to generate/select a permanent and unpredictable secure cipher with the help of an internal, non-repeatable, unpredictable, and unknown bit stream from the in-chip TRNG.
  • After creating an SUC, the GENIE is completely and irreversibly deleted. What remains is a non-removable, unchangeable and unknown operational cipher (as SUC) that nobody knows.
SUC personalization phase:
4.
TA randomly selects a set { x 1   ,     x T } of cleartext vectors out of the 2n possible combinations, where n is the size of the SUC input/output space in bits.
5.
TA stimulates the SoC device to encipher the cleartext vectors into the ciphertexts {y1, … yT} using its SUC within the device.
6.
The resulting T-(xi,yi) pairs are stored as secret pairs in the individual (personal) device records by the TA. The records should be kept secret for later use.
As the created TRNG bits are fully and exclusively responsibly for creating the SUC, and as TRNG bits are unpredictable, non-repeatable, and unknown, the resulting created SUC in the SoC device is also unknown and unpredictable, such that:
S U C t = G E N I E ( T R N G t ) .
Every t > 0. This implies that,
S U C t : { 0 , 1 } n × { 0 , 1 } k t { 0 , 1 } n ,
where n is the bit size of the SUC input/output space and kt is the bit size of the cipher’s secret key. Thus, the maximum number of distinct possible permutations is σ < 2 n ! as 2 n ! is the number of all possible {0,1}n to {0,1}n permutations. Therefore, in that case the number of possible selectable block ciphers of block size n is,
σ n < 2 n ! .
In addition, SUC has the property of being able to generate a large number of distinct CRPs as cleartext/ciphertext pairs, which is upper bounded by 2n. This counteracts the lack of CR space in the case of traditional analog PUFs.
The created cipher SUCt is a result of the TRNGt random sequence that is not known to anyone. Moreover, it is highly probable that for any two-time points t1 and t2,
T R N G t 1 T R N G t 2 S U C t 1 S U C t 2 .
Therefore, each resulting SoC device has its individual SUC with a probability ( 1 σ 1 ) 1 .
How to Use an SUC?
Figure 5 shows a generic two-way identification protocol using such SUCs for authenticating a personalized SoCA device.
An SUC-based identification protocol may proceed as follows:
  • A secret pair (xi, yi) is randomly chosen from the TA’s secret records of SoCA. Then, the TA challenges the SoCA device by the cryptogram yi over an insecure channel.
  • The SoCA device responds by sending the decrypted cleartext xi.
  • If xi = xi, then the SoCA device is deemed to be authentic, and the pair (xi, yi) is then marked as a used pair and never used again avoiding replay attack for highest security.
Refined versions of that protocol are further developed as shown in [38]. It is shown that much more efficient and low-cost CR-pairs management is possible due to the invertibility property of the SUC (with no collision as a cipher) compared to the collision-prone properties of all PUF-mappings (as somehow unknown hash-functions).

3.2. SUC Application Spectrum

The concept of SUCs as clone-resistant entity offers new attractive spectrum of applications. In [39], basic identification and usage scenarios are presented. In [40], a use case for securing IP-cores in FPGA environment is introduced. Recently, the authors published several IoT use cases for SUCs attaining very efficient management for secured remote sensing [41]. A Fleet Management System (FMS) for secured logistic operations is presented in [42]. In [43], a novel concept for electronic wallets for e-cash is presented.

4. Targeted SUCs Realization in Non-Volatile VLSI-FPGA Environment

Microsemi is the only provider of non-volatile FPGA technology with flash-based distributed switching fabrics and programmable cells. One of the advanced non-volatile SoC FPGAs from this company is SmartFusion®2. The flash-based FPGA fabric incorporates an integrated ARM Cortex-M3 processor together with powerful arithmetic units MACC and high-performance communication interfaces all integrated in a single chip. The infrastructure is smart enough to allow a GENIE program to create a cipher within the SoC unit. However, self-reconfiguration and irreversible reconfiguration-locking is still not possible in such non-volatile devices to enable self-creation of permanent unknown “hard-wired” structures as SUCs. Enabling self-reconfiguration is available in RAM-based FPGA technologies are expected to emerge similarly in the flash-based non-volatile technology in the near future. Assuming that self-reconfiguration would be possible in the future, designers can devise mechanisms for SUC-creation in such devices.
The greatest technology challenges in self-creating of SUCs can be summarized in the following two categories:
  • Designing a GENIE program as a “smart VLSI-designer” which can extend an existing FPGA design without violating the technology design rules.
  • Designing a GENIE which can serve as an obedient “smart cipher creator” to fulfill all necessary security requirements to come-up with a really unknown and unpredictable cipher (SUC).
The above two challenge-categories are technically highly hard to be practically-realized in an ultimate way. However, there are no technical reasons to believe that the SUC creation as a concept may become an impossible mission. Our proposed cipher concept in this paper shows one possible concept targeting to address both challenges in a promising and practically realizable approach.
The main objective of this work was to approach strategies towards making the targets technically possible at low area cost and low GENIE-complexity in time and memory. The particularly selected strategies in this work are:
  • Using unconsumed FPGA resources. In this case the p hardwired arithmetic addition and multiplication cores.
  • To optimally deploy the technology resources in hiding the SUC structure’s keys and function parameters.
Figure 6 shows a possible scenario for an incremental embodiment “mutation” of an SUC in Microsemi SmartFusion®2 SoC FPGA. In this scenario, the GENIE should use only resources outside the “functional HW-Cores”. That is use mainly not used “free Mathblocks” resources, “free FPGA fabric” and “free NV memory”. The result is a distributed SUC hardware and software components at possibly individual locations in each mutated device.
The existing DSP blocks, also known as Mathblocks (MACCs), include multipliers are optimized for example to be efficiently configured to perform 18 × 18 or double 9 × 9 multiplications allowing implementation of scalable arithmetic. To avoid complex modular arithmetic, the ring of integers arithmetic modulo 2n is adopted as the basic cipher algebra in 2 n .
Each “Mathblock” offers the following capabilities [34]:
  • 18 × 18 or double 9 × 9 signed multiplications (such as A [17:0] × B [17:0] or A [17:9] × B [17:9] + A [8:0] × B [8:0]).
  • Supporting dot product; the multiplier computes: (A [8:0] × B [17:9] + A [17:9] × B [8:0]) × 29.
  • Built-in addition, subtraction, and accumulation units to combine multiplication results efficiently.
A multi-precision arithmetic can even be realized in hardware to reach easily a cipher block size n of 64 bits.
Finally, the SoC units should able to be irreversibly prohibit reconfiguration after creating SUC by irreversibly setting some last-fuse hardware-lock.
Based on these existing FPGA resources, the authors consider the cases where many real applications do not consume all the available arithmetic cores. This work is, therefore seeking ciphering classes using mainly simple multiply, add and subtract arithmetic in 2 n .
The requirements on the cipher design are therefore consequently:
  • Designing huge classes of self-inverse permutation functions modulo 2n using multiplication as a major ciphering function.
  • Creating cascades of such permutations to create powerful (SUCs) to serve as “SUC-PUFs”.

5. Preliminaries on Crypto-Permutations

This section contains a short introduction to permutations for cipher design. Basic mathematical concepts and lemmas with proofs are introduced to be used throughout this work.

5.1. Early Work on Permutation for Ciphering Stages

In cryptography, it is known that confusion refers to providing high degree of non-linearity between plaintext and ciphertext of a cipher, while diffusion refers to the effect of each plaintext- and key-bit on each bit of the ciphertext. Furthermore, diffusion and confusion are considered as the two essential ciphering requirements that inhibit statistical analysis of the input-output pairs behavior. However, a substitution box (S-Box) is usually deployed as a confusion component in the modern cipher. The diffusion component (layer) is widely deployed in a different form as permutation mapping. For instance, a diffusion component is implemented as a fixed wired permutation [44] in designing ultra-lightweight cipher, so-called (PRESENT). In [45], a diffusion wired is configured as a permutation of eight 4-bit words to the design a light-weight cipher. In addition, special matrices were also used as permutation functions in the diffusion layer such as AES cipher [46]. Recently, Yunwen et al. [47] proposed two types of nonlinear functions as alternative diffusing components. The first type relies on a nonlinear code, which is known as a Kerdock code and the second type relies on the T-functions.
On the other hands, Rivest [48] introduced the exact conditions required to find permutation polynomials modulo 2 n . Moreover, Singh et al. [49] generalized the conditions for permutation polynomials over p n , where p is a prime integer. In [50], the essential conditions for creating self-inverse permutation polynomials of degree 2 over the ring were determined. Another application of permutation polynomial that investigates the permutation polynomial-based interleaves over integer rings for turbo codes is presented in [51]. A quadratic permutation polynomial and its inverse over 2 n is presented in [52,53]. Furthermore, an interesting work by Klimov [54,55] introduced the bit-slice analysis method to create the so-called T-functions. Using this method, Klimov et al. [54] proposed more generalized polynomial structures with integer coefficients using (+), (-) and the Boolean Operators over 2 n . They obtained the necessary and sufficient conditions for such polynomial structures that produce permutation functions.

5.2. Permutations

Let R be a finite ring. It is well known that not every function f : R R is representable by a polynomial over the same ring. A function f over R is called a polynomial function if there is a polynomial P ( x ) R [ x ] such that,
f ( x ) = P ( x ) ,   x R
If a polynomial function f is a one-to-one mapping, then it is called a permutation polynomial (PP) over R.
Emerging and modern technologies perform computations modulo 2 n efficiently, where, n =32, 64 or 128; therefore, studying permutation polynomials modulo 2 n for some integer n would be practical area of interest. In [48], Rivest presented the exact characterization of such PPs modulo 2 n : n > 1.
Theorem 1.
A polynomial P ( x ) = a 0 + a 1 x + + a d x d with integral coefficients is a permutation polynomial modulo 2 n : n > 1, if and only if a 1 is odd, ( a 2 + a 4 + ) is even, and ( a 3 + a 5 + ) is even [48].
For instance, a polynomial P ( x ) = a x + b x 2 is a Quadratic Permutation Polynomial (QPP) over 2 n , if a is odd and b is even.
Definition 1.
Self-inverse function or an involution is a functionfthat its own inverse for allx,
f ( f ( x ) ) = x
The following theorem gives the conditions for QPP to be Self-inverse QPP.
Theorem 2.
Let n > 2 be an integer and let P ( x ) = a x + b x 2 be a QPP over 2 n . P ( x ) is self-inverse if and only if the following conditions hold [50]:
1. 
a = 1 + 2 n 1 u , where u is a unit in 2 n .
2. 
If n is even, then b = 2 r v , where: r n / 2 and v a unit in 2 n .
3. 
If n is odd, then b = 2 r v , where: r ( n 1 ) / 2 and v a unit in 2 n .
In cryptographic applications, self-inverse permutations (Involutions) are preferably used in the rounds of block ciphers to attain low implementation complexity. Unfortunately, each permutation polynomial from the previous class does not have the required strong cryptographic properties. In fact, there is a weakness in that at least two fixed points exist in the resulting permutation for every self-inverse permutation polynomial over 2 n . This weakness of fixed points of the previous class of self-inverse polynomials is proved in the following lemma:
Lemma 1.
Any P ( x ) = a x + b x 2 satisfying the conditions of Theorem 2, has exactly two fixed points.
Proof. 
It is very clear that x = 0 is a first fixed point for every self-inverse permutation polynomial of the previous class.
Let n be an even number (odd cases can be proved similarly). For x = 2 n 1 ,
P ( 2 n 1 ) = a ( 2 n 1 ) + b ( 2 n 1 ) 2
So,
P ( 2 n 1 ) = ( 1 + 2 n 1 u ) ( 2 n 1 ) + ( 2 r v ) ( 2 n 1 ) 2
where r n 2 and u, v are units in 2 n . Thus,
P ( 2 n 1 ) = 2 n 1 + 2 2 n 2 u + 2 2 n + r 2 v
Applying mod   2 n on both sides results in,
P ( 2 n 1 ) = 2 n 2 n 1 = 2 n 1 ( 2 1 ) = 2 n 1
which proves that x = 2 n 1 is a second fixed point.
To prove that every self-inverse permutation polynomial of the previous class has no more than the two fixed points x = 0,2n-1, suppose that x0 ≠ 0,2n-1 is a fixed point. Then,
P ( x 0 ) = a ( x 0 ) + b ( x 0 ) 2 = x 0
After substitution,
( 1 + 2 n 1 u ) x 0 + ( 2 r v ) x 0 2 = x 0
Thus,
2 n 1 u x 0 + 2 r v x 0 2 = 2 x 0
Multiplying both sides by 2 results with,
2 n u x 0 + 2 r + 1 v x 0 2 = 2 2 x 0
or,
2 n u x 0 + 2 ( 2 r v x 0 2 ) x 0 = 0
Applying mod   2 n on both sides results in,
( 2 r v x 0 2 ) x 0 = 0
This is only possible if x 0 = 0 or x 0 = ( 2 r 1 v ) 1 mod 2 n , however 2 r 1 v is not an invertible element over 2 n . Therefore, x0 = 0 contradicts with the assumption x0 ≠ 0,2n-1. As a result, every self-inverse permutation polynomial of the previous class has no more than just the above given two fixed points x = 0,2n-1, Q.E.D.  □

5.3. T-Function Principles

In [54], Klimov and Shamir introduced a new class of low-complexity functions, so-called Triangular-Functions (T-function), which are invertible and exhibiting special cryptographic properties.
For x 2 n , a binary representation of x as n-bit vectors is given as follows,
x = [ x ] n 1 [ x ] 1 [ x ] 0   where ,   [ x ] i 2 for   every 0 i < n
Definition 2.
A function f ( x ) from ann-bit input to an n-bit output with the property that theithbit of its output depends only on the first, the second… and theithbit of its inputs is called a T-function (short for triangular function).
Eight basic possible constructing operations of T-functions were introduced as [52]:
  • Negation ( a ) mod 2 n , Addition ( a + b ) mod 2 n .
  • Subtraction ( a b ) mod 2 n , Multiplication ( a b ) mod 2 n , and.
  • The Boolean functions; Complement a ¯ , OR ( a b ) , and ( a b ) , and XOR ( a b ) ,
where,aandbare twon-bit words.
The following lemma gives an abstract bit-slicing representation of the arithmetic and logic operations,
Lemma 2.
For i > 0 , and x , y 2 n ,
[ x × y ] 0 = [ x ] 0 [ y ] 0 , [ x × y ] i = [ x ] i α [ y ] 0 [ y ] i α [ x ] 0 α x × y [ x ± y ] 0 = [ x ] 0 [ y ] 0 , [ x × y ] i = [ x ] i [ y ] i α x ± y [ x y ] 0 = [ x ] 0 [ y ] 0 , [ x y ] i = [ x ] i [ y ] i [ x y ] 0 = [ x ] 0 [ y ] 0 , [ x y ] i = [ x ] i [ y ] i } ,
where, α’s denotes a parameter [56].
In [54], Klimov generalized Rivest’s construction of PPs resulting with invertible mappings with T-functions properties as follows:
Theorem 3.
Let P ( x ) = a 0 + a 1 x + + a d x d be a generalized polynomial with integral coefficients. Then P ( x ) defines a permutation polynomial modulo 2n: n > 2, if and only if a 1 is odd, ( a 2 + a 4 + ) is even, and ( a 3 + a 5 + ) is even.
Definition 3.
“A T-function f ( x ) is invertible if it can be represented in the following form:
[ f ( x ) ] i = [ x ] i + α
which holds for any bit i and α is a parameter” [56]. Finding the inverse of a T-function is not straightforward and not known in general form.
The main target of the subsequent sections is to construct T-functions with SIQPF properties deploying the operations (+), (-), and . Therefore, it is necessary to determine the required cryptographically relevant conditions on P ( x ) = a x + b x 2 or P ( x ) = a + b x + c x 2 , such that P ( x ) becomes a Self-Inverse Quadratic Permutation Function (SIQPF) over the ring 2 n and P ( x ) exhibit different fixed points for different permutations.

6. New Classes of Self-Inverse Permutations

In the following, it is shown how to construct QPPs deploying +, -, and operations to come up with SIQPFs.
Definition 4.
The functions
P ( x ) = a x + b x 2 ,
or
P ( x ) = a + b x + c x 2 ,
are said to be Quadratic Permutation Functions (QPFs) over 2 n , if they permute all the elements of 2 n .
Definition 5.
A self-inverse function is a functionfover 2 n , such that,
f ( f ( x ) ) mod 2 n = x ,
wherexis ann-bit word.
Choosing the coefficientsa, baccording to Theorem 2, a, bcan be represented asn-bit vectors as follows:
a = [ a ] n 1 [ a ] 1 [ a ] 0 = 0 1 1 n 1   and   b = 1 0 1 0 0 0 r ,
where r n 2 ifnis even and r n 1 2 ifnis odd.
Lemma 3.
For n >2. A polynomial P ( x ) = a + b x + c x 2 is a permutation polynomial over 2 n if and only if b is odd and c is even (according to Theorem 3).
Lemma 4.
In 2 n :
  • If a = 0 1 1 n 1 , then a 2 mod 2 n = 0 0 n 1 1 = 1 , and ( a + 1 ) mod 2 n = 1 0 0 n 1 = 2 n 1 .
  • If a = 11 1 n , then a 2 mod 2 n = 0 0 n 1 1 = 1 , ( a + 1 ) mod 2 n = 0 and ( a . u ) mod 2 n = 2 n u
  • If u = 1 0 1 0 0 0 i and v = 1 0 1 0 0 0 j are two even numbers, then u v = 1 0 1 0 0 0 i + j , where i , j n .
  • If b = 1 0 1 0 0 0 r is an even number, then b k mod 2 n = 0 0 n = 0 for k r n .
The proof is very simple. It is based on the definitions of the multiplication and the modulus over 2 n .
Based on the previous lemma, the following theorem is proved:
Theorem 4.
: Let n > 2 be an integer. The permutation function P ( x ) = a x + b x 2 defined over 2 n is self-inverse if the following conditions are satisfied:
1. 
a = 0 1 1 n 1 or a = 11 1 n in 2 n
2. 
For n even, b = 1 0 1 0 0 0 r in 2 n where r n 2
3. 
For n odd, b = 1 0 1 0 0 0 r in 2 n where r n 1 2 .
Proof. 
First, it is required to prove that: If n is even, then P ( x ) = a x + b x 2 is a SIQPF over 2 n , where a = 0 1 1 n 1 . Other cases can be proved in a similar way.
Let,
P ( P ( x ) ) = P ( a x + b x 2 )
and,
P ( P ( x ) ) = a ( a x + b x 2 ) + b ( a x + b x 2 ) 2
so,
P ( P ( x ) ) = a a x + a b x 2 + b a 2 x 2 + 2 a b 2 x 3 + b 3 x 4
or,
P ( P ( x ) ) = a 2 x + ( a b + a 2 b ) x 2 + 2 a b 2 x 3 + b 3 x 4
Applying mod 2n on both sides results in,
P ( P ( x ) ) mod 2 n = ( a 2 x + a b ( 1 + a ) x 2 + 2 a b 2 x 3 + b 3 x 4 ) mod 2 n
From Lemma 4, the first term: ( a 2 x ) mod 2 n = 1 x = x ;
the second term: ( a b ( 1 + a b ) x 2 ) = ( a b 2 n 1 x 2 ) mod 2 n = 0 , where ( n 1 ) + n / 2 > n ;
the third term: ( 2 a b 2 x 3 ) mod 2 n = 0 , where 2 r 2 n 2 = n ; and
the fourth term: ( b 3 x 4 ) mod 2 n = 0 , where 3 r 3 n 2 > n ,
which implies
P ( P ( x ) ) mod 2 n = x for any n , Q.E.D.
 □
The same theorem for the formula in Equation (8) can be correspondingly proven and stated as follows:
Theorem 5.
For n > 2 an integer. P ( x ) = a + b x + c x 2 is a self-inverse permutation function defined over 2 n if the following conditions are satisfied:
1. 
b = 0 1 1 n 1 or b = 11 1 n in 2 n .
2. 
For n even, a = 1 0 1 0 0 0 i and c = 1 0 1 0 0 0 j in 2 n where i , j n 2 .
3. 
For n odd, a = 1 0 1 0 0 0 i and c = 1 0 1 0 0 0 j in 2 n where i , j n 1 2 .
Proof. 
First, it is required to prove that: If n is even, then P ( x ) = a + b x + c x 2 is a self-inverse permutation function over 2 n , where b = 0 1 1 n 1 . Other cases can be proved in a similar fashion.
Let g ( x ) be a function which is defined as,
g ( x ) = P ( x ) a = b x + c x 2
From Theorem 4, g ( x ) is SIQPF.
Let,
P ( P ( x ) ) = P ( a + b x + c x 2 )
And
P ( P ( x ) ) = a + b ( a + b x + c x 2 ) + c ( a + b x + c x 2 ) 2
Yielding
P ( P ( x ) ) = a + a b + b ( b x + c x 2 ) + a 2 c + 2 a c ( b x + c x 2 ) + c ( a + b x + c x 2 ) 2
By further simplification,
P ( P ( x ) ) = a ( 1 + b + a c ) + 2 a c ( b x + c x 2 ) + g ( g ( x ) )
Applying mod 2n on both and from Lemma 4 sides results in:
The first term a ( 1 + b + a c ) mod 2 n = ( a 2 n 1 + a 2 c ) mod 2 n = 0 , where i + ( n 1 ) n / 2 + ( n 1 ) > n and 2 i + j n + n / 2 > n ,
The second term: 2 a c ( b x + c x 2 ) mod 2 n = 0 , where a c = 0 for i + j n / 2 + n / 2 = n .
And the third term: g ( g ( x ) ) mod 2 n = x .
That implies, P ( P ( x ) ) mod 2 n = x for any integer n,            Q.E.D. □
Unfortunately, the P ( x ) class of Theorem 4 suffers from the same fixed-points weakness as that in P ( x ) of Theorem 2. In other words, there exist two specific fixed points ( x = 0 , 2 n 1 ) for every SIQPF. A remedy for that weakness is proposed in this work to remove the specific constant fixed points in Theorem 4. This is attained similarly as in [55] by deploying the Boolean operator (OR) as proved in the following theorem.
Theorem 6.
For n >2. A polynomial P ( x ) = a x + b ( x 2 D ) is a SIQPF in 2 n if it satisfies all the following conditions:
1. 
a = 0 1 1 n 1 or a = 11 1 n in 2 n .
2. 
For n even, b = 1 0 1 0 0 0 r in 2 n where r n 2 .
3. 
For n odd, b = 1 0 1 0 0 0 r in 2 n where r n 1 2 .
4. 
D is an integer number.
Moreover, the resulting two fixed points of any P(x) are distinct and different for each individual SIQPF.
Proof. 
Let us prove that P ( x ) = a x + b ( x 2 D ) is SIQPF where n is an even number and a = 11 1 n in 2 n .(Other cases can be proven in a similar way).
According to Theorems 4 and 5, the function f ( x ) = a x + b g ( x ) is a SIQPF, where g ( x ) = x 2 . This is always true for g ( x ) = x 2 D , if f ( x ) = a x + b g ( x ) is still an invertible function. And it is very easy to check if f ( x ) = a x + b g ( x ) is an invertible function by using a bit-slice method (Lemma 2),
[ f ( x ) ] 0 = [ a x + b g ( x ) ] 0 = [ a x ] 0 [ b g ( x ) ] 0 ,
and
[ f ( x ) ] 0 = ( [ a ] 0 [ x ] 0 ) ( [ b ] 0 [ g ( x ) ] 0 ) = [ x ] 0 ,
where, [ a ] 0 = 1 ,and [ b ] 0 = 0 . For i > 0 ,
[ f ( x ) ] i = [ a x + b g ( x ) ] i = [ a x ] i [ b g ( x ) ] i ,
and
[ f ( x ) ] i = ( [ a ] i α [ x ] 0 [ x ] i α [ a ] 0 α a x ) ( [ b ] i α [ g ( x ) ] 0 [ g ( x ) ] i α [ b ] 0 α b g ( x ) ) .
First, we check the case of 0 < i < n / 2 :
[ f ( x ) ] i = ( α [ x ] 0 [ x ] i α [ a ] 0 α a x ) ( α b g ( x ) ) ,
and
[ f ( x ) ] i = [ x ] i β ,
where, β = α [ x ] 0 α a x α b g ( x ) . Now, for i n / 2 ,
[ f ( x ) ] i = ( α [ x ] 0 [ x ] i α [ a ] 0 α a x ) ( [ b ] i α [ g ( x ) ] 0 α b g ( x ) ) ,
And
[ f ( x ) ] i = [ x ] i γ ,
where, γ = α [ x ] 0 α a x [ b ] i α [ g ( x ) ] 0 α b g ( x ) .
Technically, from Equations (12)–(14) and Definition 3, the function f ( x ) = a x + b g ( x ) can be represented as,
[ f ( x ) ] i = [ x ] i + α ,
which holds for any bit i and α is a parameter. Therefore, f ( x ) = a x + b ( x 2 D ) is an invertible function.
It is very simple to show that b ( ( 2 n 1 ) 2 D ) = b D and b ( ( 0 ) 2 D ) = b D over 2 n , therefore x = 0 , 2 n 1 are not fixed points for any D 0 . Suppose now, for i = 1 , 2 , there are two different SIQPFs such as P i ( x ) = a x + b ( x 2 D i ) , where D 1 D 2 0 , having the same fixed point x 0 as follows:
P 1 ( x 0 ) = P 2 ( x 0 ) ,
which implies,
x 0 2 D 1 = x 0 2 D 2 .
The last step is only correct, if and only if D 1 = D 2 , which proves that the resulting fixed points of any P(x) are distinct and different for each individual SIQPF, Q.E.D. □

Practical significance of the SIQPFs of Theorem 6

The fact that the resulting SIQPF according to the construction in Theorem 6, results with two individual and different fixed points for each different SIQPF is advantageous for cryptographic applications. The reason is that, ciphering operations involve usually cascading many different SIQPFs as round functions (see cipher structure in Section 9 and Figure 8). Therefore, the dynamic distribution of the different fixed points for different SIQPFs in different cascading stages results in general with improved random diffusion property of the overall cipher permutation.
Extending the P ( x ) class of Equation (9) similarly as done for the class of Equation (8) in Theorem 6, results in a new larger class with similar properties as in the following Theorem 7:
Theorem 7
For n >2 an integer. P ( x ) = a + b x + c ( x 2 D ) is a self-inverse permutation function defined over 2 n if the following conditions are satisfied:
1. 
b = 0 1 1 n 1 or b = 11 1 n in 2 n .
2. 
For n even, a = 1 0 1 0 0 0 i and c = 1 0 1 0 0 0 j in 2 n where i , j n 2 .
3. 
For n odd, a = 1 0 1 0 0 0 i and c = 1 0 1 0 0 0 j in 2 n where i , j n 1 2 .
4. 
D is an integer number.
Moreover, the resulting two fixed points of any P(x) are distinct and different for each individual SIQPF.
Proof. 
Is similar to that of Theorem 6. □

7. Cardinality of Proposed SIQPF Classes

In this section, the cardinality of the SIQPF classes are evaluated. Moreover, the equivalent and distinct mappings of the permutation polynomials are identified.
In 2 n ,not all permutations can be generated by polynomials and every permutation may be generated by different polynomials which are called equivalent polynomials modulo 2n. Therefore, computing the number of distinct polynomial permutations over 2 n , requires excluding equivalent cases.
Let Pn be a set of all possible permutation polynomials resulting with distinct permutations over 2 n . Keller et al. [57] presented a formula to determine the cardinality of Pn. The cardinality of the set of all polynomial functions over different rings with some special conditions is presented in [58]. The formula which determines the cardinality of Pn is given in [57,59] as follows:
| P n | = 2 3 + k = 3 n β ( k ) ,
where, β(k) is the smallest integer s such that 2k divides s!.
Making use of Rivest Theorem 1, the number of permutation polynomials of degree at most d can be computed by the following lemma:
Lemma 5.
For n >2, the number of all possible permutation polynomials of degree at most d over 2 n is N0 where:
N 0 = 2 n + d ( n 1 )
Proof. 
For every n, and from Theorem 1, the following is always true:
a 0 = 1 0 1 0 n | a 0 | = 2 n ,
and
a 1 = 1 0 1 0 n 1 1 | a 1 | = 2 n 1 .
Using the fact, that the sum of two even or odd integers is always even and according to Theorem 1, implies:
a i = 1 0 1 0 n 1 * | a i | = 2 n 1 ,
where the * position is a fixed 0 or 1. That is, the number of permutation polynomials which have the form P ( x ) = a 0 + a 1 x + + a d x d is:
N 0 = 2 n 2 n 1 2 n 1 d = 2 n + d ( n 1 ) ,   Q . E . D .
 □
Definition 6.
The polynomials f(x) and g(x) over 2 n are equivalent polynomials modulo 2n, if such polynomials satisfy the following condition [60]:
f ( x ) g ( x ) mod 2 n
In other words, the resulting polynomials generates the same permutation. Note that according to the above lemma, the number of permutation polynomialsN0may include some equivalent permutation polynomials modulo 2n. The following definition appears to be useful for the targeted evaluation.
Definition 7.
The cardinality of the set of all equivalent permutation polynomials modulo 2n with degree d ≤ 2n-1, is equal to the numbers of all possible permutation polynomials N0 having the degree d ≤ 2n-1 excluding all distinct permutation polynomials | Pn |. That is:
| E q u i v a l e n t P e r m u t a t i o n s | = N 0 | P n |
Table 1 shows the number of equivalent permutation polynomials modulo 2nof degree at most 2n-1 for few selected small values ofn. It is noticed that for even smalln= 8 results with a huge number of equivalent permutation polynomials.
Therefore, it seems useful to seek an upper bound for the degree d of all distinct permutation polynomials. The following upper bound on d can be derived by making use of (16) for ( N 0 = | P n | ), resulting with:
d ˜ = log 2 | P n | n n 1 ,
where the degree d ˜ is the upper bound of the degree of distinct PPs in size n. The values of n, Pn are known and is the ceiling function. The formula in Equation (19) represents a necessary design rule for selecting such distinct permutation polynomials.
Table 2 shows the relation between the cardinality of PPs and the corresponding highest degree d of non-equivalent PPs over 2 n . As all practical applications require n > 3 for 2 n , and all proposed new SIQPFs classes have degree 2 then all resulting PPs in any class are distinct. In the following, the cardinality of each distinct class of the new SIQPFs is computed:
Corollary 1.
For n > 2, the cardinality of a class C1: P ( x ) = a x + b x 2 over 2 n is:
| C 1 | = { 2 ( 2 n 2 1 ) : f o r n e v e n 2 ( 2 n + 1 2 1 ) : f o n n o d d
Proof. 
For n even, and from Theorem 4, the following is true:
a = 0 1 1 n 1 o r 1 1 n | a | = 2 ,
and
b = 1 0 1 0 0 0 n 2 | b | = 2 n 2 1 .
This implies, | C 1 | = | a | | b | = 2 ( 2 n 2 1 ) .
For n odd and applying similar steps, that implies: | C 1 | = | a | | b | = 2 ( 2 n + 1 2 1 ) ,    Q.E.D.  □
Table 3 shows the corresponding cardinalities for all new SIQPFs classes, where the procedure of Corollary 1 is repeatedly applied for each class. For a practical example of 64-bit arithmetic where n = 64, the cardinalities of the permutation classes |C1| = 233, |C2| = 265, |C3| = 297 and |C4| = 2129.
Notice that the given cardinalities in Table 3 represent worst case bounds. The exact cardinalities seem to be difficult to evaluate as equal mapping may happen in different mappings constellations. Therefore, the smallest cardinality values are used when evaluating the resulting cipher performance and cardinalities.

8. Hardware and Complexity Evaluation of SUC Rounds

To implement SQIPFs in the targeted FPGA platform, fabric Look-Up Tables (LUTs), D-Flip Flops (DFFs), and Mathblocks are required. Therefore, an optimal and effective implementation strategy proposes to attain the same number of LUTs and DFFs, i.e. the ratio R L U T / D F F = # o f   L U T s # o f   D F F s should be close to 1. This can be inferred from the fact that when consuming an LUT, its corresponding DFF in the same logic cell cannot be used elsewhere as its input is used for the LUT. Most FPGA architectures provide an easy to connect DFF within each LUT.
The implementation complexity of such classes in SmartFusion®2 SoC FPGA is one of the major objectives of this research. Therefore, a sample complexity evaluation should show the relative efficiency of the designed permutations.
These classes of SIQPFs could be implemented in both hardware and software or by combining HW/SW implementation scenario for the targeted SUCs described in [29]. In this case, the SIQPF could constitute one efficient class required for constructing the SUC cascade. The cryptographic strength (attack complexity) of the generated permutations is attained through a huge number of possibilities of each SIQPF class simply controlled by the permutation function coefficients.

8.1. Hardware Complexity

Figure 7 shows a basic hardware configuration for building the function a + b x + c x 2 for n = 18 bits by using 2 Mathblocks. The designed SIQPFs are modeled in VHDL and synthesized to check their hardware complexity and performance. ModelSim ME package is used for simulation and Synplify pro ME within Libero SoC is used for synthesis. When implementing these functions, the Multipliers (MACC), LUT and DFF constitute the basic resources for implementing such functions.
By analyzing the FPGA resource usage for each function, a closed formula was found for the number of MACCs, (NMACC), LUTs (N4LUT) and DFFs (NDFF) for each class of SIQPFs and input data size in bits. Table 4 shows the required hardware resources (hardware complexity) as a function of the number of bits n for 1 ≤ n ≤ 32 bits for the permutation classes C1 and C2. The complexities of the permutation classes C3 and C3 are slightly higher and are not included in this evaluation.
Here U is a unit step function defined as U ( t t 0 ) = { 0 : t < t 0 1 : t t 0
Table 5 shows sample hardware complexities for permutations with number of bits n up to 32 bits. Notice, RLUT/DFF of class ( b x c x 2 ), for instance, is equal to 1.01, 1.009, and 1.1, when n =8, 17 and 32 respectively.
Notice also that, SIQPF a + b x + c x 2 exhibits the highest efficiency as it makes maximum use out of the same deployed number of MACCs.

8.2. Software Complexity

SmartFusion®2 SoC FPGA incorporates ARM Cortex-M3 that supports Thumb2 instruction set, it contains enhanced instructions as single cycle multiplication between two numbers of 32 bits. Table 6 shows the time and memory implementation complexities of the same set of permutation functions when using ARM Cortex software environment for some chosen numbers of bits n.

9. Proposed New SUC Constructions Based on Self-Inverse Permutations

To generate larger classes of ciphers, cascading one or more SIQPFs is necessary. This is also the first step toward creating SUCs with cryptographically significant entropy.

9.1. Possible Creation of an SUC as a Key-Alternating Cascade of SIQPFs

In [56], the permutation T-function f used to construct unusual permutations by Xoring of any pair of f(x), x as f ( x ) x . Furthermore, extending the resulting SIQPF’s classes by using this result, for example, with P ( x ) = a + b x c x 2 as a SIQPF, the XOR of any pairs of P(x), x is a permutation P ( x ) x but not necessarily a SIQPF. One of the most important results based on this discussion is in deploying them in counteracting the weakness stated in Theorems 4–7. For example, let P ( x ) = 3 x + 2 x 2 be a SIQPF in 2 3 and let G ( x ) = x 3 be an XOR mapping where the bitwise XORing operation with any given value represents an involution. Therefore, the resulting function composition f ( x ) = ( 3 x + 2 x 2 ) 3 is SIQPF without fixed points. However, the previous discussion proves that XORing a SIQPF with the key k results with in a round function P ( x ) k for a block cipher which avoids fixed points, where k is a round key.

9.1.1. Cardinality of the GENIE-Selectable SUCs

This section investigates the cardinality of the resulting cipher when using the key-alternating cipher structure of Figure 8. The cipher has r randomly selected self-inverse permutations P 1 , , P r and ( r + 1 ) randomly selected n-bit keys.
The usable self-inverse permutations are included in the above 4 different classes C 1 , C 2 , C 3 , and   C 4 from which P 1 , , P r can be randomly selected.
Notice that, for highest security and to avoid fixed points in the total mapping, at least one permutation needs to be selected from the classes C3 and/or C4. We select few possible random cipher selection strategies to evaluate the cardinality of all possible selectable SUCs.
  • Fully selecting from the set containing all 4 classes
In this case, we consider the selectable mappings, in Figure 8, to be out of the set of all 4 classes C 1 , C 2 , C 3 , and   C 4 . Hence:
  • The cardinality S of all classes of mappings is then:
    S = | C 1 | + | C 2 | + | C 3 | + | C 4 | = ( 2 n + 1 2 1 ) ( 2 n + 1 2 + 1 + 2 ( n + 1 ) 2 2 )
  • As each cipher utilizes ( r + 1 ) keys of size n, the cardinality of keys is: 2 n × ( r + 1 )
  • The GENIE selects r-mappings randomly from S, hence there is r! possible placements of the mappings to build each cipher.
The GENIE selects randomly r mappings from the classes of mappings S and ( r + 1 ) × n key bits. The placement of the selected mappings is totally random. We investigate the following two selection cases.
Case 1.
If the selection is done with allowedPirepetition (i.e. the GENIE can select the same mapping multiple times for differentPi s), then the total number σ 11 of all possible different key-alternating ciphers-selections including keys according to Figure 8 as an SUC having r rounds with an input size of n-bit is:
σ 11 = r ! × S r + 2 n × ( r + 1 )
Case 2.
If the selection is done withoutPirepetition, then the total SUC selections cardinality σ 12 in that case according toFigure 8is:
σ 12 = r ! × ( S r ) + 2 n × ( r + 1 )
B.
Selecting fixed number of mappings from each class
In the second case, we consider for lower hardware complexity that the GENIE is designing the SUC cipher by deploying a fixed number of selections for P i from each class C i , the realization of such SUCs is according to the SUC-Design-Template mechanism proposed in [30]. Since there exist 4 classes, we consider that the cipher-structure has a fixed template of P i selections as follows:
  • t 1 mappings ( P i s) from C 1
  • t 2 mappings ( P i s) from C 2
  • t 3 mappings ( P i s) from C 3
  • t 4 mappings ( P i s) from C 4
Note that t 1 + t 2 + t 3 + t 4 = r . t i 0
Case 3.
If the selection from each class C i , with 1 i 4 , is done with repetition, then the total number σ 21 of all possible different key-alternating ciphers-selections according to Figure 8 as an SUC having r rounds with an input size of n bit is:
σ 21 = ( t 1 ! × t 2 ! × t 3 ! × t 4 ! ) × ( | C 1 | t 1 × | C 2 | t 2 × | C 3 | t 3 × | C 4 | t 4 ) + 2 n × ( r + 1 ) σ 21 = i = 1 4 ( t i ! × | C i | t i ) + 2 n × ( r + 1 )
Case 4.
If the selection is done without repetition, then the cardinality σ 22 of this cipher (Figure 8) is:
σ 22 = ( t 1 ! × t 2 ! × t 3 ! × t 4 ! ) × ( | C 1 | t 1 ) × ( | C 2 | t 2 ) × ( | C 3 | t 3 ) × ( | C 4 | t 4 ) + 2 n × ( r + 1 ) σ 22 = i = 1 4 ( t i ! × ( | C i | t i ) ) + 2 n × ( r + 1 )
The main advantage of deployed involutive (self-inverse) cascaded permutations (as SIQPFs) is that the same mapping modules can be used for both encryption and decryption operations by just reversing the sequence of the mappings with their round keys.

9.1.2. SUC Cloning Security Measure

SUC cloning security depends on the attacker’s effort required to find the unknown selected SUC out of all possible choices σ i j . For example, if the GENIE is selecting according to Case 1 creating a cipher with a block size n = 64 bit having r = 16 rounds, then:
σ 11 = r ! × S r + 2 n × ( r + 1 ) = r ! × [ ( 2 n + 1 2 1 ) ( 2 n + 1 2 + 1 + 2 ( n + 1 ) 2 2 ) ] r + 2 n × ( r + 1 ) σ 11 = 16 ! × [ ( 2 64 + 1 2 1 ) ( 2 64 + 1 2 + 1 + 2 ( 64 + 1 ) 2 2 ) ] 16 + 2 64 × ( 16 + 1 ) 2 34904 Cipher   cardinality + 2 1088 Key   cardinality
That is the attacker needs to reveal the correct cipher-choice out of about 234904 possible SUC-choices (without considering the key-choices) to be able to clone it. Notice that a part of the resulting ciphers in different cascade constellation may result with equal ciphers. That is, the cipher cardinality may be reduced to become 234904-d, where d is hard to find. However d is expected to be cryptographically not significant.
Therefore, for a larger σ i j more cloning security is attained. Notice that a larger σ i j mostly requires more hardware complexity.

9.2. Security Evaluation of the Resulting SUCs

The security level (or bound) of any cipher is conventionally determined by applying Kerckhoffs’s principle. That is the attacker knows all details of the used cipher structure except the cipher-key which is unknown to the attacker. As in SUC concept, the cipher is even not known to anybody, the attack complexity is basically expected to increased [61]. However, the cipher structure may be predicted if the GENIE is published. Otherwise, if the GENIE is not published (this is allowed in the proposed realization concept), the attack complexity is expected to increase.
A well-known interpolation attack would successfully reveal a mapping y equivalent to the whole SIQPF cascade if and only if SUC is given as a cascade of only algebraic classes of SIQPF such as P ( x ) = a ± b x ± c x 2 . In this case, an adversary can compute such equivalent mapping y to all r rounds by just 2r+1 known plaintext/ciphertext pairs [62,63] as follows:
y = f ( x ) = i = 1 r 1 j r , i j x x j x i x j
Note that an adversary needs just to know that the functions as a quadratic one and guess the number of rounds r.
In another case, the interpolation attack is not applicable, when the selection of SIQPFs is drawn from non- algebraic classes such as P ( x ) = a + b x + c ( x 2 D ) . However, Klimov et al. [55] presented an attack scenario on T-function f ( x ) = x + ( x 2 C ) , when it is as a substitute for LFSR in a stream cipher. This attack works, for example, only if the size of C is small such as n 3 , and then it requires O ( 2 n / 3 ) . There is no such attack on a block cipher that uses a T-function as round function.

9.3. Modeling Attack on the Proposed SUC

When looking at modeling attacks on SUCs there are two possibilities: Firstly, the target of an adversary using ML is to create a predictive model of an SUC by analyzing some training data. Theoretically, if an SUC is a weak Pseudorandom Function (PRF), then certain patterns of plaintext/ciphertext pairs could be easily identified and detected by a ML algorithm with little training. But when an SUC is a secure PRF, the successful detection of patterns becomes impossible. Moreover, if a designed SUC is a secure PRF, then there is no ML algorithm that can build a predictive model for such an SUC, because the secure PRF concept postulates that the output of PRF is statistically independent of training data and uncorrelated with any learner [64].
The second possible modeling attack is to store all the possible plaintext/ciphertext pairs as the Cipher Codebook size CCBS=2n. However, storing 2n bits to build a model for an SUC is infeasible for ciphers with n > 80.
In this section, the focus is put on the adversary who tries to use the collected SUC-input/output pairs in distinguishing attacks. Here, successful distinguishing attacks on SUCs indicate that the designed SUC structure is vulnerable. Therefore, sooner or later the adversary can build a predictive model for the designed SUC. If not, modeling attacks on SUCs are almost infeasible.
As a result of the above notes, definitions, and discussion the self-generated SUC inside a chip can be modeled as a secure Pseudorandom Permutation (PRP) chosen randomly from the class of all possible generated ciphers { C 1 , C 2 , C σ } , where, σ 2 n ! as follows:
S U C : { 0 , 1 } n × { 0 , 1 } k { 0 , 1 } n                           ( X , K ) P R P Y
where, n and k are the input-output size and the key size, respectively. The inverse of SUC should be a secure PRP as well:
S U C 1 : { 0 , 1 } n × { 0 , 1 } k { 0 , 1 } n                           ( Y , K ) P R P X
In [65], Bogdanov et al. conjectured that the query complexity of the distinguishing attack on a key-alternating cipher is 2 r r + 1 n , where, n is the cipher input size, and r is the rounds number. In [66], Steinberger presented an improved security bound 2 3 4 n for the distinguishing attack on a key-alternating cipher, when r > 2 . In [67], Lampe et al. showed that if r is even, the security bound attains 2 r r + 2 n . In [68], the tight security bound 2 r r + 1 n of the distinguishing attack on a key-alternating cipher is proved, i.e., there is no more security bound that can be attained.
It is, therefore, conjectured, that the security bound 2 ( ε ) n is enhanced by a factor equal to the product of the cardinalities of the deployed SIQPFs, where ε is a function of r. An ongoing research is conducted to answer this still open question. However, the proposed SUC cipher design fulfills, therefore, at least the state-of-the-art security requirements for standard good ciphers.
In the following section some statistical properties of SIQPFs are investigated. Here, the statistical properties provide an initial proof of the indistinguishability of the proposed SUCs.

9.4. Statistical Properties of the Resulting SUC

In this section, the diffusion [46] and a frequency prediction [69] as statistical properties of SIQPFs are analyzed and studied.
  • SUC Diffusion Properties
The essential definition of a diffusion is to determine the number of changed output bits when one input bit has been changed. Ideally, the changing ratio of the output bits is 50%. However, a T-function is defined as a mapping in which bit i of the output depends on 0, 1, …, i bits of the inputs [54], thus indicating that changing the first input bit affects all n output bits, changing the second input bit affects the last n-1 output bits, etc. The changing of last input bit affects the last output bit. To test this property, the hamming distance between outputs of randomly selected SIQPF by changing one input bit every time. The applicable Algorithm 1 is defined as a simulator to determine the amount of diffusion.
Algorithm 1 Diffusion Test on the Proposed SUCs.
Enter n = 32, cipher rounds r = 8, and select randomly one SIQPF P.
Select randomly 10000 input values x(i), where i = 1, …, 10000.
Determine the dependence matrix A;
A j i ( P ) = 10 4 i = 1 10000 P ( x ( i ) ) P ( x ( i ) e j ) ,
where, e j = ( δ j 1 , δ j 2 , , δ j 32 ) , δ j i is a Kronecker’s delta.
Return the average of A.
The results in Figure 9 show that the increasing of number of rounds in Equation (21) does not change the statistical distribution of the diffusion of any resulting cipher in the class. In this case, the simulation indicates that the average of diffusion is close to 50% for repeatedly using a single SIPQF with r (iterations) rounds.
B.
SUC Cipher Text Bit Frequency Distribution
A probability distribution P [ y i = 1 ] indicates the level of predictability of the bit output yi, when yi =1. The ideal case corresponds to P [ y i = 1 ] = 50 % . To test this, 10000 random input/output pairs are used for selected SIPQF, where the predication of each output bit yi is given based on statistical distribution of P [ y i = 1 ] . This procedure has been performed and repeated for 10 randomly selected SIPQF. Results in Figure 10 show a high unpredictability of the bit output yi, while P [ y i = 1 ] is close to 50%.

10. Conclusions

In this paper, new classes of low-complexity self-inverse permutations based on T-Functions (SIPFs) are presented. The target usage of such functions is for creating the so-called Secret Unknown Ciphers (SUC) at very low cost to serve as clone resistant digital PUFs. The permutations algebra is deploying optimized usage of multiplier/Mathblocks units which are often not consumed in many FPGA applications. As a result, high quality ciphers may be embedded with negligible cost by using unconsumed resources in such SoC units. The resulting new cipher classes based on 2 n arithmetic are very promising in their security and quality. The resulting SUC structures are designed to be used as PUFs alternative and security anchors in the emerging future smart application scenarios. Creating SUCs is a very challenging task. This work is a part of an ongoing basic research towards creating and embedding SUCs in future VLSI-technologies and showing their possible applications. Being created in a manufacturer-independent-process and by end-users, the SUC technology is expected to be attractive for wide spectrum of applications in future automotive and IoT environment.

Author Contributions

Conceptualization, S.M., A.M and W.A.; Methodology, S.M. and A.M; Software, A.M and S.M.; Supervision, W.A.; Validation, S.M. and A.M.; Formal analysis, S.M. and A.M.; Visualization, S.M., A.M and W.A.; Writing—original draft preparation, S.M. and A.M; Writing—review and editing, S.M., W.A. and A.M.; Project administration, W.A. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the DAAD Research Grants-Doctoral Programmes in Germany Nr. (57214224) and the German Federal Foreign Office scholarship funding (STIBET) program, as well as Microsemi, a Microchip Company, San Jose, CA, USA, and Volkswagen AG-Germany.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Kim, N.Y.; Rathore, S.; Ryu, J.H.; Park, J.H.; Park, J.H. A Survey on Cyber Physical System Security for IoT: Issues, Challenges, Threats, Solutions. J. Inf. Process. Syst. 2018, 14, 1361–1384. [Google Scholar]
  2. Delvaux, J.; Peeters, R.; Gu, D.; Verbauwhede, I. A Survey on Lightweight Entity Authentication with Strong PUFs. ACM Comput. Surv. 2015, 48, 1–42. [Google Scholar] [CrossRef] [Green Version]
  3. Skorobogatov, S. Semi-Invasive Attacks: A New Approach to Hardware Security Analysis. Available online: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.228.2204&rep=rep1&type=pdf (accessed on 20 December 2019).
  4. Guajardo, J.; Kumar, S.S.; Schrijen, G.-J.; Tuyls, P. FPGA Intrinsic PUFs and Their Use for IP Protection. In Cryptographic Hardware and Embedded Systems—CHES 2007; Springer: Berlin, Germany, 2007; pp. 63–80. [Google Scholar]
  5. Adi, W.; Ouertani, N.; Hanoun, A.; Soudan, B. Deploying FPGA self-configurable cell structure for micro crypto-functions. In Proceedings of the 2009 IEEE Symposium on Computers and Communications, Sousse, Tunisia, 5–8 July 2009; pp. 348–354. [Google Scholar]
  6. Mulhem, S.; Adi, W. New Mathblocks-Based Feistel-Like Ciphers for Creating Clone-Resistant FPGA Devices. Cryptography 2019, 3, 28. [Google Scholar] [CrossRef] [Green Version]
  7. Babaei, A.; Schiele, G. Physical Unclonable Functions in the Internet of Things: State of the Art and Open Challenges. Sensors 2019, 19, 3208. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  8. Maes, R.; Verbauwhede, I. Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions; Springer: Berlin, Germany, 2010; pp. 3–37. [Google Scholar]
  9. Pappu, R.; Recht, B.; Taylor, J.; Gershenfeld, N. Physical One-Way Functions. Science 2002, 297, 2026–2030. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  10. Gassend, B.; Clarke, D.; van Dijk, M.; Devadas, S. Controlled physical random functions. In Proceedings of the 18th Annual Computer Security Applications Conference, Las Vegas, NV, USA, 9–13 December 2002. [Google Scholar]
  11. Adi, W. Autonomous Physical Secret Functions and Clone-Resistant Identification. In Proceedings of the 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security; Edinburgh, UK, 20–21 August 2009; pp. 83–88. [Google Scholar]
  12. Gassend, B.; Clarke, D.; van Dijk, M.; Devadas, S. Silicon physical random functions. In Proceedings of the 9th ACM conference on Computer and communications security—CCS ’02; Washington, DC, USA, 18–22 November 2002; p. 148. [Google Scholar]
  13. Marchand, C.; Bossuet, L.; Mureddu, U.; Bochard, N.; Cherkaoui, A.; Fischer, V. Implementation and Characterization of a Physical Unclonable Function for IoT: A Case Study With the TERO-PUF. IEEE Trans. Comput. Des. Integr. Circuits Syst. 2018, 37, 97–109. [Google Scholar] [CrossRef] [Green Version]
  14. Daihyun, L.; Lee, J.W.; Gassend, B.; Suh, G.E.; van Dijk, M.; Devadas, S. Extracting secret keys from integrated circuits. IEEE Trans. Very Large Scale Integr. Syst. 2005, 13, 1200–1205. [Google Scholar] [CrossRef]
  15. Gołofit, K.; Wieczorek, P. Chaos-Based Physical Unclonable Functions. Appl. Sci. 2019, 9, 991. [Google Scholar] [CrossRef] [Green Version]
  16. Santiago, L.; Patil, V.C.; Prado, C.B.; Alves, T.A.O.; Marzulo, L.A.J.; Franca, F.M.G.; Kundu, S. Realizing strong PUF from weak PUF via neural computing. In Proceedings of the 2017 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), Delft, The Netherlands, 2–10 October 2019; pp. 1–6. [Google Scholar]
  17. Santiago de Araújo, L.; Patil, V.C.; Prado, C.B.; Alves, T.A.O.; Marzulo, L.A.J.; França, F.M.G.; Kundu, S. Design of Robust, High-Entropy Strong PUFs via Weightless Neural Network. J. Hardw. Syst. Secur. 2019, 3, 235–249. [Google Scholar] [CrossRef]
  18. Hou, S.; Guo, Y.; Li, S. A Lightweight LFSR-Based Strong Physical Unclonable Function Design on FPGA. IEEE Access 2019, 7, 64778–64787. [Google Scholar] [CrossRef]
  19. Bhargava, M.; Mai, K. An efficient reliable PUF-based cryptographic key generator in 65nm CMOS. In Proceedings of the 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), Dresden, Germany, 24–28 March 2014; pp. 1–6. [Google Scholar]
  20. Wang, Y.; Xi, X.; Orshansky, M. Lattice PUF: A Strong Physical Unclonable Function Provably Secure against Machine Learning Attacks. Available online: https://arxiv.org/pdf/1909.13441.pdf (accessed on 20 December 2019).
  21. Dodis, Y.; Ostrovsky, R.; Reyzin, L.; Smith, A. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. SIAM J. Comput. 2008, 38, 97–139. [Google Scholar] [CrossRef] [Green Version]
  22. Rührmair, U.; Sehnke, F.; Sölter, J.; Dror, G.; Devadas, S.; Jürgen, S. Modeling attacks on physical unclonable functions. In Proceedings of the 17th ACM conference on Computer and communications security—CCS ’10, Chicago, IL, USA, 4–8 October 2010; p. 237. [Google Scholar]
  23. Rührmair, U.; Busch, H.; Katzenbeisser, S. Strong PUFs: Models, Constructions, and Security Proofs. In Towards Hardware-Intrinsic Security. Information Security and Cryptography; Sadeghi, A.R., Naccache, D., Eds.; Springer: Berlin, Germany, 2010; pp. 79–96. [Google Scholar]
  24. Rührmair, U.; Sölter, J.; Sehnke, F. On the Foundations of Physical Unclonable Functions. 2009. Available online: http://www.crypto.rub.de/imperia/md/crypto/kiltz/ulrich_paper_40.pdf (accessed on 20 December 2019).
  25. Ruhrmair, U.; Solter, J.; Sehnke, F.; Xu, X.; Mahmoud, A.; Stoyanova, V.; Dror, G.; Schmidhuber, J.; Burleson, W.; Devadas, S. PUF Modeling Attacks on Simulated and Silicon Data. IEEE Trans. Inf. Forensics Secur. 2013, 8, 1876–1891. [Google Scholar] [CrossRef] [Green Version]
  26. Sadeghi, A.; Visconti, I.; Wachsmann, C. PUF-Enhanced RFID Security and Privacy. Available online: https://www.researchgate.net/profile/Ivan_Visconti/publication/265986050_PUF-enhanced_RFID_security_and_privacy/links/5723720208ae262228aa6ad3/PUF-enhanced-RFID-security-and-privacy.pdf (accessed on 20 December 2019).
  27. Calhoun, J.; Minwalla, C.; Helmich, C.; Saqib, F.; Che, W.; Plusquellic, J. Physical Unclonable Function (PUF)-Based e-Cash Transaction Protocol (PUF-Cash). Cryptography 2019, 3, 18. [Google Scholar] [CrossRef] [Green Version]
  28. Zhu, F.; Li, P.; Xu, H.; Wang, R. A Lightweight RFID Mutual Authentication Protocol with PUF. Sensors 2019, 19, 2957. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  29. Fyrbiak, M.; Kison, C.; Jeske, M.; Adi, W. Combined HW-SW adaptive clone-resistant functions as physical security anchors. In Proceedings of the 2013 NASA/ESA Conference on Adaptive Hardware and Systems (AHS-2013), Torino, Italy, 24–27 June 2013; pp. 130–137. [Google Scholar]
  30. Mars, A.; Adi, W. Digitally Mutating NV-FPGAs into Physically Clone-Resistant Units. arXiv 2019, arXiv:1908.03898. Available online: https://arxiv.org/ftp/arxiv/papers/1908/1908.03898.pdf (accessed on 20 December 2019). [Google Scholar]
  31. Mars, A.; Adi, W. New Family of Stream Ciphers as Physically Clone-Resistant VLSI-Structures. Cryptography 2019, 3, 11. [Google Scholar] [CrossRef] [Green Version]
  32. Mars, A.; Adi, W.; Mulhem, S.; Hamadaqa, E. Random stream cipher as a PUF-like identity in FPGA environment. In Proceedings of the 2017 Seventh International Conference on Emerging Security Technologies (EST), Canterbury, UK, 6–8 September 2017; pp. 209–214. [Google Scholar]
  33. Wu, J.; O’Neill, M. On Foundation and Construction of Physical Unclonable Functions. Available online: https://eprint.iacr.org/2010/171.pdf (accessed on 20 December 2019).
  34. SmartFusion2 SoC FPGAs. Available online: https://www.microsemi.com/product-directory/soc-fpgas/1692-smartfusion2 (accessed on 8 September 2019).
  35. Adi, W.; Zeitouni, S.; Huang, X.; Fyrbiak, M.; Kison, C.; Jeske, M.; Alnahhas, Z. IP-core protection for a non-volatile Self-reconfiguring SoC environment. In Proceedings of the 2013 IFIP/IEEE 21st International Conference on Very Large Scale Integration (VLSI-SoC); Istanbul, Turkey, 7–9 October 2013; pp. 252–255. [Google Scholar]
  36. Adi, W.; Soudan, B. Bio-Inspired Electronic-Mutation with genetic properties for Secured Identification. In Proceedings of the ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for Security, Edinburgh, UK, 9–10 August 2007; pp. 133–136. [Google Scholar]
  37. Mulhem, S.; Mohammad, M.; Adi, W. A New Low-Complexity Cipher Class for Clone-Resistant Identities. In Proceedings of the 2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, 20–24 May 2019; pp. 971–976. [Google Scholar]
  38. Mulhem, S.; Zarrouk, R.; Adi, W. Security and Complexity Bounds of SUC-Based Physical Identity. In Proceedings of the 2018 NASA/ESA Conference on Adaptive Hardware and Systems (AHS), Edinburgh, UK, 6–9 August 2018; pp. 317–322. [Google Scholar]
  39. Adi, W.; Benkrid, K. Adaptive and evolvable hardware security architectures. In Proceedings of the 2010 NASA/ESA Conference on Adaptive Hardware and Systems, Anaheim, CA, USA, 15–18 June 2010; pp. 194–198. [Google Scholar]
  40. Adi, W.; Benkrid, K. Ultimate design security in self-reconfiguring non-volatile environments. In Proceedings of the 2010 NASA/ESA Conference on Adaptive Hardware and Systems, Anaheim, CA, USA, 15–18 June 2010; pp. 230–234. [Google Scholar]
  41. Adi, W.; Mulhem, S.; Mars, A. Secured remote sensing by deploying clone-resistant Secret Unknown Ciphers. In Proceedings of the 2017 IEEE International Conference on Consumer Electronics—Taiwan (ICCE-TW), Taipei, Taiwan, 12–14 June 2017; pp. 133–134. [Google Scholar]
  42. Hamadaqa, E.; Mulhem, S.; Mars, A.; Adi, W. Clone-Resistant Joint-Identity Technique for Securing Fleet Management Systems. In Proceedings of the 2018 NASA/ESA Conference on Adaptive Hardware and Systems (AHS), Edinburgh, UK, 6–9 August 2018; pp. 327–332. [Google Scholar]
  43. Mars, A.; Adi, W. New Concept for Physically-Secured E-Coins Circulations. In Proceedings of the 2018 NASA/ESA Conference on Adaptive Hardware and Systems (AHS), Edinburgh, UK, 6–9 August 2018; pp. 333–338. [Google Scholar]
  44. Bogdanov, A.; Knudsen, L.R.; Leander, G.; Paar, C.; Poschmann, A.; Robshaw, M.J.B.; Seurin, Y.; Vikkelsoe, C. PRESENT: An Ultra-Lightweight Block Cipher. In Cryptographic Hardware and Embedded Systems—CHES 2007; Springer: Berlin, Germany, 2007; pp. 450–466. [Google Scholar]
  45. Wu, W.; Zhang, L. LBlock: A Lightweight Block Cipher. In Proceedings of the Applied Cryptography and Network Security. In Proceedings of 9th International Conference, ACNS 2011, Nerja, Spain, 7–10 June 2011; pp. 327–344. [Google Scholar]
  46. Daemen, J.; Rijmen, V. The Design of Rijndael: AES—The Advanced Encryption Standard; Springer: Berlin, Germany, 2002. ISBN 978366204 7224.
  47. Liu, Y.; Rijmen, V.; Leander, G. Nonlinear diffusion layers. Des. Codes Cryptogr. 2018, 86, 2469–2484. [Google Scholar] [CrossRef]
  48. Rivest, R.L. Permutation Polynomials Modulo 2w. Finite Fields Their Appl. 2001, 7, 287–292. [Google Scholar] [CrossRef] [Green Version]
  49. Singh, R.P.; Maity, S. Permutation Polynomials modulo pn. 2009. Available online: https://eprint.iacr.org/2009/393.pdf (accessed on 20 December 2019).
  50. Tapia-Recillas, H. Remarks on Self-Inverse Quadratic Permutation Polynomials 2010. Available online: http://www.m-hikari.com/ija/ija-2010/ija-17-20-2010/tapiaIJA17-20-2010.pdf (accessed on 20 December 2019).
  51. Sun, J.; Takeshita, O.Y. Interleavers for turbo codes using permutation polynomials over integer rings. IEEE Trans. Inf. Theory 2005, 51, 101–119. [Google Scholar]
  52. Ryu, J.; Takeshita, O.Y. On Inverses for Quadratic Permutation Polynomials over Integer Rings. Available online: https://arxiv.xilesou.top/pdf/1102.2223.pdf (accessed on 20 December 2019).
  53. Ryu, J.; Takeshita, O.Y. On quadratic inverses for quadratic permutation polynomials over integer rings. IEEE Trans. Inf. Theory 2006, 52, 1254–1260. [Google Scholar]
  54. Klimov, A.; Shamir, A. A New Class of Invertible Mappings. In Proceedings of the 4th International Workshop Redwood Shores, San Francisco Bay, CA, USA, 13–15 August 2002; pp. 470–483. [Google Scholar]
  55. Klimov, A.; Shamir, A. Cryptographic Applications of T-Functions. In Proceedings of the 10th Annual International Workshop, SAC 2003, Ottawa, ON, Canada, 14–15 August 2003; pp. 248–261. [Google Scholar]
  56. Klimov, A. Applications of T-functions in Cryptography. Ph.D. Thesis, Weizmann Institute of Science, Rehovot, Israel, 2005. [Google Scholar]
  57. Keller, G.; Olson, F.R. Counting polynomial functions $(\mod p^n)$. Duke Math. J. 1968, 35, 835–838. [Google Scholar] [CrossRef]
  58. Zhang, Q. Polynomial functions and permutation polynomials over some finite commutative rings. J. Number Theory 2004, 105, 192–202. [Google Scholar] [CrossRef] [Green Version]
  59. Jiang, J.J.; Jun, J. On the number counting of polynomial functions. J. Math. Res. Expo. 2010, 30, 241–248. [Google Scholar]
  60. Li, S. Null Polynomials modulo m. Available online: https://arxiv.xilesou.top/pdf/math/0510217.pdf (accessed on 20 December 2019).
  61. Biryukov, A.; Shamir, A. Structural Cryptanalysis of SASAS. In Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, 6–10 May 2001; pp. 395–405. [Google Scholar]
  62. Jakobsen, T.; Knudsen, L.R. The interpolation attack on block ciphers. In Proceedings of the 4th International Workshop, FSE’97, Haifa, Israel, 20–22 January 1997; pp. 28–40. [Google Scholar]
  63. Jakobsen, T. Cryptanalysis of block ciphers with probabilistic non-linear relations of low degree. In Proceedings of the 18th Annual International Cryptology Conference, Santa Barbara, CA, USA, 23–27 August 1998; pp. 212–222. [Google Scholar]
  64. Bogdanov, A.; Rosen, A. Pseudorandom Functions: Three Decades Later. In Tutorials on the Foundations of Cryptography. Information Security and Cryptography.; Lindell, Y., Ed.; Springer: Cham, Germany, 2017; pp. 79–158. ISBN 978-3-319-57048-8. [Google Scholar]
  65. Bogdanov, A.; Knudsen, L.R.; Leander, G.; Standaert, F.-X.; Steinberger, J.; Tischhauser, E. Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations. In Proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, 15–19 April 2012; pp. 45–62. [Google Scholar]
  66. Steinberger, J. Improved Security Bounds for Key-Alternating Ciphers via Hellinger Distance, 2012. Available online: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.449.4664&rep=rep1&type=pdf (accessed on 20 December 2019).
  67. Lampe, R.; Patarin, J.; Seurin, Y. An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher. In Proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, 2–6 December 2012; pp. 278–295. [Google Scholar]
  68. Chen, S.; Steinberger, J. Tight Security Bounds for Key-Alternating Ciphers. In Proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, 11–15 May 2014; pp. 327–350. [Google Scholar]
  69. Xu, T.; Potkonjak, M. Robust and flexible FPGA-based digital PUF. In Proceedings of the 2014 24th International Conference on Field Programmable Logic and Applications (FPL), Munich, Germany, 2–4 September 2014; pp. 1–6. [Google Scholar]
Figure 1. Related Physical Unclonable Functions (PUF) - Improvements to Resist Modeling Attacks. Adapted from [10,20,26]. PRF = Pseudorandom function; LFSR = linear-feedback shift register; ECC = error correction code.
Figure 1. Related Physical Unclonable Functions (PUF) - Improvements to Resist Modeling Attacks. Adapted from [10,20,26]. PRF = Pseudorandom function; LFSR = linear-feedback shift register; ECC = error correction code.
Cryptography 04 00006 g001
Figure 2. Two Proposals Deploying PUFs Comparable to our Solution Based on SUC Technique.
Figure 2. Two Proposals Deploying PUFs Comparable to our Solution Based on SUC Technique.
Cryptography 04 00006 g002
Figure 3. Key idea for generating a Secret Unknown Cipher (SUC) [6]. FPGA = Field Programmable Gate Arrays; TRNG = true random number generator.
Figure 3. Key idea for generating a Secret Unknown Cipher (SUC) [6]. FPGA = Field Programmable Gate Arrays; TRNG = true random number generator.
Cryptography 04 00006 g003
Figure 4. Mutating a Secret Unknown Cipher (SUC) into a system-on-chip (SoC) device [6].
Figure 4. Mutating a Secret Unknown Cipher (SUC) into a system-on-chip (SoC) device [6].
Cryptography 04 00006 g004
Figure 5. Two-way identification protocol over an insecure channel [6].
Figure 5. Two-way identification protocol over an insecure channel [6].
Cryptography 04 00006 g005
Figure 6. Sample functional layout after creating an SUC in an FPGA device [6].
Figure 6. Sample functional layout after creating an SUC in an FPGA device [6].
Cryptography 04 00006 g006
Figure 7. Implementing a + b x + c x 2 by using two Mathblocks.
Figure 7. Implementing a + b x + c x 2 by using two Mathblocks.
Cryptography 04 00006 g007
Figure 8. Key-alternating format of the targeted GENIE-created SUCs.
Figure 8. Key-alternating format of the targeted GENIE-created SUCs.
Cryptography 04 00006 g008
Figure 9. SIPQF classes diffusion by using 1000 random pairs.
Figure 9. SIPQF classes diffusion by using 1000 random pairs.
Cryptography 04 00006 g009
Figure 10. The probability that any output bit is 1.
Figure 10. The probability that any output bit is 1.
Cryptography 04 00006 g010
Table 1. Number of distinct and equivalent permutation polynomials (PPs).
Table 1. Number of distinct and equivalent permutation polynomials (PPs).
2 n # of Distinct PPs (15)# of Equivalent PPs
N0 - |Pn|
n = 4213248.8
n = 62292321
n = 8247217923
Table 2. Upper bound of degree of distinct PPs.
Table 2. Upper bound of degree of distinct PPs.
2 n Maximum   Degree d ˜
n = 43
n = 54
n = 65
n = 75
n = 86
Table 3. Cardinality of all resulting classes of Self-Inverting Permutation Functions (SIPFs).
Table 3. Cardinality of all resulting classes of Self-Inverting Permutation Functions (SIPFs).
Class   of   SIPFs   in   2 n   Cardinality
n: Evenn: Odd
C1: P ( x ) = a x + b x 2 2 ( 2 n 2 1 ) 2 ( 2 n + 1 2 1 )
C2: P ( x ) = a + b x + c x 2 2 ( 2 n 2 1 ) 2 2 ( 2 n + 1 2 1 ) 2
C3: P ( x ) = a x + b ( x 2 D ) 2 n + 1 ( 2 n 2 1 ) 2 n + 1 ( 2 n + 1 2 1 )
C4: P ( x ) = a + b x + c ( x 2 D ) 2 n + 1 ( 2 n 2 1 ) 2 2 n + 1 ( 2 n + 1 2 1 ) 2
Table 4. Hardware complexity. LUT = Look-Up Tables; DFF = D-Flip Flops; NMACC = number of MACCs; N4LUT = number of Look-Up Tables; NDFF = number of D-Flip Flops.
Table 4. Hardware complexity. LUT = Look-Up Tables; DFF = D-Flip Flops; NMACC = number of MACCs; N4LUT = number of Look-Up Tables; NDFF = number of D-Flip Flops.
a + b x + c x 2 N M A C C = 2 U ( n 3 ) + U ( n 9 ) + 6 U ( n 18 )
N 4 L U T = U ( n 1 ) + 3 U ( n 2 ) + 69 U ( n 3 ) + 36 U ( n 9 ) + ( 2 n + 217 ) U ( n 18 )
N D F F = 72 U ( n 3 ) + 36 U ( n 9 ) + 216 U ( n 18 )
a + b x c x 2 N M A C C = 3 U ( n 3 ) + 6 U ( n 18 )
N 4 L U T = U ( n 1 ) + 3 U ( n 2 ) + 109 U ( n 3 ) + 4 U ( n 4 ) + ( 2 n + 217 ) U ( n 18 )
N D F F = 108 U ( n 3 ) + 216 U ( n 18 )
b x + c x 2 N M A C C = 2 U ( n 3 ) + U ( n 9 ) + 6 U ( n 18 )
N 4 L U T = U ( n 1 ) + 2 U ( n 2 ) + 70 U ( n 3 ) + 36 U ( n 9 ) + ( n + 217 ) U ( n 18 )
N D F F = 72 U ( n 3 ) + 36 U ( n 9 ) + 216 U ( n 18 )
b x c x 2 N M A C C = 3 U ( n 3 ) + U ( n 9 ) + 9 U ( n 18 )
N 4 L U T = U ( n 1 ) + 2 U ( n 2 ) + 109 U ( n 3 ) 3 U ( n 4 ) + ( n + 217 ) U ( n 18 )
N D F F = 108 U ( n 3 ) + 216 U ( n 18 )
a + b x c x 2 N M A C C = 3 U ( n 3 ) + 9 U ( n 18 )
N 4 L U T = U ( n 1 ) + 2 U ( n 2 ) + ( n + 109 ) U ( n 3 ) + ( n + 199 ) U ( n 18 )
N D F F = 108 U ( n 3 ) + 216 U ( n 18 )
b x c x 2 N M A C C = 3 U ( n 3 ) + 9 U ( n 18 )
N 4 L U T = U ( n 1 ) + 3 U ( n 2 ) + ( n + 105 ) U ( n 3 ) + ( n + 216 ) U ( n 18 )
N D F F = 108 U ( n 3 ) + 216 U ( n 18 )
Table 5. Sample hardware complexity evaluations.
Table 5. Sample hardware complexity evaluations.
SIPFsTotal Cost
n = 8n = 17n = 32RLUT/DFF, n = 32
a + b x + c x 2 NMACC239 1.2
N4LUT73109390
NDFF72108324
a + b x c x 2 NMACC3391.2
N4LUT109109390
NDFF108108324
b x + c x 2 NMACC2391.1
N4LUT73109357
NDFF72108324
b x c x 2 NMACC3391.1
N4LUT73109358
NDFF72108324
a + b x c x 2 NMACC3391.1
N4LUT117126357
NDFF108108324
b x c x 2 NMACC3391.2
N4LUT117126389
NDFF108108324
Table 6. Software performance and complexity.
Table 6. Software performance and complexity.
SIPFsTotal Cost
n = 16n = 32
b x + c x 2 36 bytes
15 cycles
28 bytes
13 cycles
b x c x 2 36 bytes
15 cycles
28 bytes
13 cycles
b x c x 2 84 bytes
29 cycles
36 bytes
16 cycles
a + b x + c x 2 60 bytes
22 cycles
36 bytes
18 cycles
a + b x c x 2 76 bytes
27 cycles
36 bytes
18 cycles
a + b x c x 2 100 bytes
34 cycles
44 bytes
19 cycles

Share and Cite

MDPI and ACS Style

Mulhem, S.; Mars, A.; Adi, W. Low-Complexity Nonlinear Self-Inverse Permutation for Creating Physically Clone-Resistant Identities. Cryptography 2020, 4, 6. https://doi.org/10.3390/cryptography4010006

AMA Style

Mulhem S, Mars A, Adi W. Low-Complexity Nonlinear Self-Inverse Permutation for Creating Physically Clone-Resistant Identities. Cryptography. 2020; 4(1):6. https://doi.org/10.3390/cryptography4010006

Chicago/Turabian Style

Mulhem, Saleh, Ayoub Mars, and Wael Adi. 2020. "Low-Complexity Nonlinear Self-Inverse Permutation for Creating Physically Clone-Resistant Identities" Cryptography 4, no. 1: 6. https://doi.org/10.3390/cryptography4010006

APA Style

Mulhem, S., Mars, A., & Adi, W. (2020). Low-Complexity Nonlinear Self-Inverse Permutation for Creating Physically Clone-Resistant Identities. Cryptography, 4(1), 6. https://doi.org/10.3390/cryptography4010006

Article Metrics

Back to TopTop