当前位置: X-MOL 学术ACM J. Emerg. Technol. Comput. Syst. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Cryptography with Analog Scheme Using Memristors
ACM Journal on Emerging Technologies in Computing Systems ( IF 2.1 ) Pub Date : 2020-09-15 , DOI: 10.1145/3412439
Bertrand Cambou 1 , David Hély 2 , Sareh Assiri 1
Affiliation  

Networks of low-power Internet of Things do not have always access to enough computing power to support mainstream cryptographic schemes; such schemes also consume computing power that can be exposed to side channel attacks. This article describes a method, that we call “cryptography with analog scheme using memristors,” leveraging the physical properties of memristors, which are active elements suitable for the design of components such as artificial neurons. The proposed devices encrypt messages by segmenting them into blocks of bits, each modulating the injected currents into randomly selected memristor cells, resulting into sets of resistance values turned into cipher texts. Through hash-protected handshakes, identical addresses are independently generated by both communicating devices, to concurrently point at the same set of cells in the arrays, and their images. These block ciphers, for example, 1 KB long, can only be decrypted with the same memristor array driven by analog circuitry or its image, rather than digital key-based schemes. The proposed methods generate cipher text, and decrypt them, with approximately one femto joule per bit, which is below observable level through differential power analysis. The article explains how the use of different cells for each message to encrypt, driven under different conditions, has the potential to mitigate mainstream attacks. It provides a detailed characterization of memristors to evaluate the feasibility of the approach and discusses some hardware and architectures to implement the scheme.

中文翻译:

使用忆阻器的模拟方案加密

低功耗物联网网络并不总是能够获得足够的计算能力来支持主流密码方案;此类方案还消耗可能受到侧信道攻击的计算能力。本文描述了一种方法,我们称之为“使用忆阻器的模拟方案密码学”,它利用忆阻器的物理特性,忆阻器是适用于设计人工神经元等组件的有源元件。所提出的设备通过将消息分割成比特块来加密消息,每个比特块将注入的电流调制到随机选择的忆阻器单元中,从而将电阻值集转换为密文。通过哈希保护握手,两个通信设备独立生成相同的地址,同时指向数组中的同一组单元格及其图像。这些分组密码(例如 1 KB 长)只能使用由模拟电路或其映像驱动的相同忆阻器阵列来解密,而不是基于数字密钥的方案。所提出的方法生成密文并对其进行解密,每比特大约 1 毫微微焦耳,这低于通过差分功率分析可观察到的水平。这篇文章解释了在不同条件下对每条消息使用不同的单元进行加密,如何有可能减轻主流攻击。它提供了忆阻器的详细特性来评估该方法的可行性,并讨论了一些硬件和架构来实现该方案。只能使用由模拟电路或其映像驱动的相同忆阻器阵列来解密,而不是基于数字密钥的方案。所提出的方法生成密文并对其进行解密,每比特大约 1 毫微微焦耳,这低于通过差分功率分析可观察到的水平。这篇文章解释了在不同条件下对每条消息使用不同的单元进行加密,如何有可能减轻主流攻击。它提供了忆阻器的详细特性来评估该方法的可行性,并讨论了一些硬件和架构来实现该方案。只能使用由模拟电路或其映像驱动的相同忆阻器阵列来解密,而不是基于数字密钥的方案。所提出的方法生成密文并对其进行解密,每比特大约 1 毫微微焦耳,这低于通过差分功率分析可观察到的水平。这篇文章解释了在不同条件下对每条消息使用不同的单元进行加密,如何有可能减轻主流攻击。它提供了忆阻器的详细特性来评估该方法的可行性,并讨论了一些硬件和架构来实现该方案。低于通过差分功率分析可观察到的水平。这篇文章解释了在不同条件下对每条消息使用不同的单元进行加密,如何有可能减轻主流攻击。它提供了忆阻器的详细特性来评估该方法的可行性,并讨论了一些硬件和架构来实现该方案。低于通过差分功率分析可观察到的水平。这篇文章解释了在不同条件下对每条消息使用不同的单元进行加密,如何有可能减轻主流攻击。它提供了忆阻器的详细特性来评估该方法的可行性,并讨论了一些硬件和架构来实现该方案。
更新日期:2020-09-15
down
wechat
bug