MOE: Multiplication Operated Encryption with Trojan Resilience

نویسندگان

چکیده

In order to lower costs, the fabrication of Integrated Circuits (ICs) is increasingly delegated offshore contract foundries, making them exposed malicious modifications, known as hardware Trojans. Recent works have demonstrated that a strong form Trojan-resilience can be obtained from untrusted chips by exploiting secret sharing and Multi-Party Computation (MPC), yet with significant cost overheads. this paper, we study possibility building symmetric cipher enabling similar guarantees in more efficient manner. To reach goal, exploit simple round structure mixing modular multiplication binary matrix. Besides being motivated new block design for Trojan resilience, our research also exposes cryptographic properties multiplication, which independent interest.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multiplication Based Elliptic Curve Encryption Scheme With Optimized Scalar Multiplication (MECES)

Elliptic Curve Cryptography (ECC) fits well for an efficient and secure encryption scheme. It is efficient than the ubiquitous RSA based schemes because ECC utilizes smaller key sizes for equivalent security. This feature of ECC enables it to be applied to Wireless networks where there are constraints related to memory and computational power. The goal of this research is to develop an efficien...

متن کامل

Multiplication Based Elliptic Curve Encryption Scheme with Optimized Scalar Multiplication (MECES)

Elliptic Curve Cryptography (ECC) fits well for an efficient and secure encryption scheme. It is efficient than the ubiquitous RSA based schemes because ECC utilizes smaller key sizes for equivalent security. This feature of ECC enables it to be applied to Wireless networks where there are constraints related to memory and computational power. The goal of this research is to develop an efficien...

متن کامل

Achieving Leakage Resilience through Dual System Encryption

In this work, we show that strong leakage resilience for cryptosystems with advanced functionalitiescan be obtained quite naturally within the methodology of dual system encryption, recently introducedby Waters. We demonstrate this concretely by providing fully secure IBE, HIBE, and ABE systems whichare resilient to bounded leakage from each of many secret keys per user, as well as ...

متن کامل

Five guys named Moe: a tribute to Moe Bergman.

ors. It was not about Moe Bergman, but the name of the musical is a metaphor for Moe. He was an unpretentious mover and shaker who made major contributions in several different areas. He had an amazing ability in addressing a diffi cult problem to demonstrate personality traits that were appropriate for the task at hand. On many occasions, he demonstrated an ability to address several diverse p...

متن کامل

Encryption-decryption Rgb Color Image Using Matrix Multiplication

An enhanced technique of color image encryption based on random matrix key encoding is proposed. To encrypt the color image a separation into Red Green and Blue (R, G, B) channels will applied. Each channel is encrypted using a technique called double random matrix key encoding then three new coding image matrices are constructed. To obtain the reconstructed image that is the same as the origin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IACR transaction on symmetric cryptology

سال: 2021

ISSN: ['2519-173X']

DOI: https://doi.org/10.46586/tosc.v2021.i1.78-129