An overview of memristive cryptography

The European Physical Journal Special Topics - Tập 228 - Trang 2301-2312 - 2019
Alex Pappachen James1
1Nazarbayev University, Astana, Kazakhstan

Tóm tắt

Smaller, smarter and faster edge devices in the Internet of things era demand secure data analysis and transmission under resource constraints of hardware architecture. Lightweight cryptography on edge hardware is an emerging topic that is essential to ensure data security in near-sensor computing systems such as mobiles, drones, smart cameras and wearables. In this article, the current state of memristive cryptography is placed in context of lightweight hardware cryptography. The paper provides a brief overview of the traditional hardware lightweight cryptography and cryptanalysis approaches. The contrast for memristive cryptography with respect to traditional approaches is evident through this article, and need to develop a more concrete approach to developing memristive cryptanalysis to test memristive cryptographic approaches is highlighted.

Tài liệu tham khảo

Z.-K. Zhang, M. Cheng Yi Cho, C.-W. Wang, C.-W. Hsu, C.-K. Chen, S. Shieh, IoT security: ongoing challenges and research opportunities, in 2014 IEEE 7th International Conference on Service-oriented Computing and Applications (IEEE, 2014), pp. 230–234 A. Dorri, S.S. Kanhere, R. Jurdak, P. Gauravaram, Blockchain for IoT security and privacy: the case study of a smart home, in 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops) (IEEE, 2017), pp. 618–623 J. Cache, V. Liu, J. Wright, Hacking Exposed Wireless: Wireless Security Secrets and Solutions (McGraw-Hill, 2007) M. Warren, S. Leitch, Social engineering and its impact via the internet, in Proceedings of the 4th Australian Information Security Management Conference (Australian Information Security Management, 2006), pp. 184–189 J. Katz, A.J. Menezes, P.C. Van Oorschot, S.A. Vanstone, Handbook of Applied Cryptography (CRC Press, 1996) M. Stamp, R.M. Low, Applied Cryptanalysis: Breaking Ciphers in the Real World (John Wiley & Sons, 2007) K. Balasubramanian, Recent developments in cryptography: a survey, in Algorithmic Strategies for Solving Complex Problems in Cryptography (IGI Global, 2018), pp. 1–22 Y.B. Zhou, D.G. Feng, IACR Cryptol. ePrint Arch. 2005, 388 (2005) E. Brier, M. Joye, Weierstra elliptic curves and side-channel attacks, in International Workshop on Public Key Cryptography (Springer, 2002), pp. 335–345 G. Joy Persial, M. Prabhu, R. Shanmugalakshmi, J. Int, Adva. Sci. Res. Rev. 1, 54 (2011) A.V. Sergienko, Quantum Communications and Cryptography (CRC Press, 2018) J. Buchmann, K. Lauter, M. Mosca, IEEE Security Privacy 16, 12 (2018) I. Damaj, S. Kasbah, Comput. Electr. Eng. 69, 572 (2018) S. Rajagopalan, R. Amirtharajan, H.N. Upadhyay, J.B. Balaguru Rayappan, J. App. Sci. 12, 201 (2012) G.M. de Dormale, J.-J. Quisquater, J. Syst. Archit. 53, 72 (2007) N. El Mrabet, J.J.A. Fournier, L. Goubin, R. Lashermes, Cryptogr. Commun. 7, 185 (2015) A. Pantelopoulos, N.G. Bourbakis, IEEE Trans. Syst. Man Cybern. Part C (App. Rev.) 40, 1 (2010) A. Ometov, P. Masek, L. Malina, R. Florea, J. Hosek, S. Andreev, J. Hajny, J. Niutanen, Y. Koucheryavy, Feasibility characterization of cryptographic primitives for constrained (wearable) iot devices, in 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops) (IEEE, 2016), pp. 1–6 H. Huff, Into the nano era: Moore’s law beyond planar silicon CMOS (Springer Science and Business Media, 2008), Vol. 106 R.S. Williams, Comput. Sci. Eng. 19, 7 (2017) A.B. Kahng, IEEE Des. Test Comput. 27, 86 (2010) O. Krestinskaya, A.P. James, L.O. Chua, Neuro-memristive circuits for edge computing: a review, in IEEE Transactions on Neural Networks and Learning Systems (IEEE, 2019), pp. 1–20 D.B. Strukov, G.S. Snider, D.R. Stewart, R. Stanley Williams, Nature 453, 80 (2008) L. Chua, IEEE Trans. Circuit Theor. 18, 507 (1971) S. Vongehr, X. Meng, Sci. Rep. 5, 11657 (2015) I. Abraham, Sci. Rep. 8, 10972 (2018) Y.N. Joglekar, S.J. Wolf, Eur. J. Phys. 30, 661 (2009) Y. Ho, G.M. Huang, P. Li, IEEE Trans. Circuits Syst. I: Regul. Pap. 58, 724 (2011) F. Corinto, M. Forti, IEEE Trans. Circuits Syst. I: Regul. Pap. 65, 1327 (2018) L. Chua, Appl. Phys. A 124, 563 (2018) P.J. Kuekes, D.R. Stewart, R.S. Williams, J. Appl. Phys. 97, 034301 (2005) B. Mouttet, Proposal for memristor crossbar design and applications, in Memristors and Memristive Systems Symposium, UC Berkeley (2008) B.L. Mouttet, Programmable Crossbar Signal Processor (November 27 2007), US Patent 7,302,513 P.O. Vontobel, W. Robinett, P.J. Kuekes, D.R. Stewart, J. Straznicky, R.S. Williams, Nanotechnology 20, 425204 (2009) K.-H. Kim, S. Gaba, D. Wheeler, J.M. Cruz-Albrecht, T. Hussain, N. Srinivasa, W. Lu, Nano Lett. 12, 389 (2011) X. Zhang, A. Huang, Q. Hu, Z. Xiao, P.K. Chu, Phys. Status Solidi A 215, 1700875 (2018) O. Krestinskaya, K.N. Salama, A.P. James, Analog backpropagation learning circuits for memristive crossbar neural networks, in 2018 IEEE International Symposium on Circuits and Systems (ISCAS) (IEEE, 2018), pp. 1–5 G.C. Adam, B.D. Hoskins, M. Prezioso, F. Merrikh-Bayat, B. Chakrabarti, D.B. Strukov, IEEE Trans. Electron Devices 64, 312 (2017) W. Lu, K.-H. Kim, T. Chang, S. Gaba, Two-terminal resistive switches (memristors) for memory and logic applications, in Proceedings of the 16th Asia and South Pacific Design Automation Conference (IEEE Press, 2011), pp. 217–223 A. Irmanova, A.P. James, Analog Integr. Circuits Sign. Process. 95, 429 (2018) S. Stathopoulos, A. Khiat, M. Trapatseli, S. Cortese, A. Serb, I. Valov, T. Prodromakis, Sci. Rep. 7, 17532 (2017) C. Li, M. Hu, Y. Li, H. Jiang, N. Ge, E. Montgomery, J. Zhang, W. Song, N. Dávila, C.E. Graves, Z. Li, Nat. Electr. 1, 52 (2018) O. Krestinskaya, A. Irmanova, A.P. James, Memristive non-idealities: is there any practical implications for designing neural network chips? in IEEE International Symposium on Circuits and Systems (IEEE, 2019), pp. 1–5 T. Eisenbarth, S. Kumar, C. Paar, A. Poschmann, L. Uhsadel, IEEE Des. Test Comput. 24, 522 (2007) J. Daemen, V. Rijmen, The Design of Rijndael: AES-the Advanced Encryption Standard (Springer Science & Business Media, 2013) D. Hankerson, A. Menezes, Elliptic Curve Cryptography (Springer, 2011) D. Hong, J. Sung, S. Hong, J. Lim, S. Lee, B.-S. Koo, C. Lee, D. Chang, J. Lee, K. Jeong, H. Kim, Hight: a new block cipher suitable for low-resource device, in International Workshop on Cryptographic Hardware and Embedded Systems (Springer, Berlin, Heidelberg, 2006), pp. 46–59 T. Shirai, K. Shibutani, T. Akishita, S. Moriai, T. Iwata, The 128-bit blockcipher CLEFIA, in International Workshop on Fast Software Encryption (Springer, 2007), pp. 181–195 S. Panasenko, S. Smagin, Int. J. Comput. Theor. Eng. 3, 516 (2011) S.R. Moosavi, T.N. Gia, A.-M. Rahmani, E. Nigussie, S. Virtanen, J. Isoaho, H. Tenhunen, Proc. Comput. Sci. 52, 452 (2015) D. Engels, X. Fan, G. Gong, H. Hu, E.M. Smith, Hummingbird: ultra-lightweight cryptography for resource-constrained devices, in International Conference on Financial Cryptography and Data Security (Springer, 2010), pp. 3–18 A.Y. Poschmannm, Lightweight cryptography: cryptographic engineering for a pervasive world, Ph.D. thesis, Citeseer, 2009 L. Knudsen, G. Leander, A. Poschmann, M.J.B. Robshaw, Printcipher: a block cipher for ic-printing, in International Workshop on Cryptographic Hardware and Embedded Systems (Springer, 2010), pp. 16–32 C.H. Lim, T. Korkishko, mCrypton – a lightweight block cipher for security of low-cost RFID tags and sensors, in International Workshop on Information Security Applications (Springer, 2005), pp. 243–258 Z. Gong, S. Nikova, Y.W. Law, Klein: a new family of lightweight block ciphers, in International Workshop on Radio Frequency Identification: Security and Privacy Issues (Springer, 2011), pp. 1–18 S. Tomoyasu, Twine: a lightweight block cipher for multiple platforms, in Selected Areas in Cryptography (Springer Berlin Heidelberg, 2012), Vol. 7707 R. Beaulieu, S. Treatman-Clark, D. Shors, B. Weeks, J. Smith, L. Wingers, The simon and speck lightweight block ciphers, in 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC) (IEEE, 2015), pp. 1–6 J. Borghoff, A. Canteaut, T. Güneysu, E.B. Kavun, M. Knezevic, L.R. Knudsen, G. Leander, V. Nikov, C. Paar, C. Rechberger, P. Rombouts, PRINCE–A low-latency block cipher for pervasive computing applications, in International Conference on the Theory and Application of Cryptology and Information Security (Springer, 2012), pp. 208–225 M.R. Albrecht, B. Driessen, E.B. Kavun, G. Leander, C. Paar, T. Yalçn, Block ciphers – focus on the linear layer (feat. PRIDE), in International Cryptology Conference (Springer, 2014), pp. 57–76 W. Wu, L. Zhang, LBlock: a lightweight block cipher, in International Conference on Applied Cryptography and Network Security (Springer, 2011), pp. 327–344 M. Izadi, B. Sadeghiyan, S.S. Sadeghian, H.A. Khanooki, Mibs: a new lightweight block cipher, in International Conference on Cryptology and Network Security (Springer, 2009), pp. 334–348 H. Cheng, H.M. Heys, C. Wang, Puffin: a novel compact block cipher targeted to embedded digital systems, in 2008 11th EUROMICRO Conference on Digital System Design Architectures, Methods and Tools (IEEE, 2008), pp. 383–390 S. Tripathy, Int. J. Commun. Networks Distrib. Syst. 10, 176 (2013) K. Shibutani, T. Isobe, H. Hiwatari, A. Mitsuda, T. Akishita, T. Shirai, Piccolo: an ultra-lightweight blockcipher, in International Workshop on Cryptographic Hardware and Embedded Systems (Springer, 2011), pp. 342–357 S. Kolay, D. Mukhopadhyay, Khudra: a new lightweight block cipher for FPGAs, in Int. Conf. Security Privacy Appl. Cryptogr. Eng. (Springer, 2014), pp. 126–145 R. Struik, AEAD Ciphers for Highly Constrained Networks (DIAC, 2013) J. Balasch, B. Ege, T. Eisenbarth, B. Gérard, Z. Gong, T. Güneysu, S. Heyse, S. Kerckhof, F. Koeune, T. Plos, T. Pöppelmann, Compact implementation and performance evaluation of hash functions in attiny devices, in International Conference on Smart Card Research and Advanced Applications (Springer, 2012), pp. 158–172 B. Schneier, Cryptologia 24, 18 (2000) B. Sun, Z. Liu, V. Rijmen, R. Li, L. Cheng, Q. Wang, H. Alkhzaimi, C. Li, Links among impossible differential, integral and zero correlation linear cryptanalysis, in Annual Cryptology Conference (Springer, 2015), pp. 95–115 D. Karaklajić, J.-M. Schmidt, I. Verbauwhede, IEEE Trans. Very Large Scale Integr. VLSI Syst. 21, 2295 (2013) L.R. Knudsen, Truncated and higher order differentials, in International Workshop on Fast Software Encryption (Springer, 1994), pp. 196–211 J. Kim, S. Hong, J. Sung, S. Lee, J. Lim, S. Sung, Impossible differential cryptanalysis for block cipher structures, in International Conference on Cryptology in India (Springer, 2003), pp. 82–96 E. Biham, A. Biryukov, A. Shamir, Miss in the middle attacks on idea and khufu, in International Workshop on Fast Software Encryption (Springer, 1999), pp. 124–138 Q. Wang, Z. Liu, K. Varc, Y. Sasaki, V. Rijmen, Y. Todo, Cryptanalysis of reduced-round SIMON32 and SIMON48, in International Conference in Cryptology in India (Springer, 2014), pp. 143–160 C. Boura, M. Naya-Plasencia, V. Suder, Scrutinizing and improving impossible differential attacks: applications to CLEFIA, Camellia, LBlock and Simon, in International Conference on the Theory and Application of Cryptology and Information Security (Springer, 2014), pp. 179–199 H. Mala, M. Dakhilalian, M. Shakiba, J. Comput. Sci. Technol. 26, 744 (2011) W.-L. Wu, W.-T. Zhang, D.-G. Feng, J. Comput. Sci. Technol. 22, 449 (2007) H. Mala, M. Dakhilalian, V. Rijmen, M. Modarres-Hashemi, Improved impossible differential cryptanalysis of 7-round AES-128, in International Conference on Cryptology in India (Springer, 2010), pp. 282–291 F. Karakoç, H. Demirci, A.E. Harmanc, Impossible differential cryptanalysis of reduced-round lblock, in IFIP International Workshop on Information Security Theory and Practice (Springer, 2012), pp. 179–188 K. Nishimura, M. Sibuya, J. Cryptol. 2, 13 (1990) L. Wei, C. Rechberger, J. Guo, H. Wu, H. Wang, S. Ling, Improved meet-in-the-middle cryptanalysis of KTANTAN (poster), in Australasian Conference on Information Security and Privacy (Springer, 2011), pp. 433–438 A. Bogdanov, D. Khovratovich, C. Rechberger, Biclique cryptanalysis of the full AES, in International Conference on the Theory and Application of Cryptology and Information Security (Springer, 2011), pp. 344–371 A. Canteaut, M. Naya-Plasencia, B. Vayssiere, Sieve-in-the-middle: improved mitm attacks, in Advances in Cryptology–CRYPTO 2013 (Springer, 2013), pp. 222–240 K. Jeong, H.C. Kang, C. Lee, J. Sung, S. Hong, Biclique cryptanalysis of lightweight block ciphers present, piccolo and led, IACR Cryptol. ePrint Arch. 2012, 621 (2012) M.A. Abdelraheem, C. Blondeau, M. Naya-Plasencia, M. Videau, E. Zenner, Cryptanalysis of ARMADILLO2, in International Conference on the Theory and Application of Cryptology and Information Security (Springer, 2011), pp. 308–326 M. Naya-Plasencia, How to improve rebound attacks, in Annual Cryptology Conference (Springer, 2011), pp. 188–205 M. Naya-Plasencia, D. Toz, K. Varici, Rebound attack on JH42, in International Conference on the Theory and Application of Cryptology and Information Security (Springer, 2011), pp. 252–269 F. Mendel, C. Rechberger, M. Schläffer, S.S. Thomsen, The rebound attack: cryptanalysis of reduced whirlpool and grøstl, in International Workshop on Fast Software Encryption (Springer, 2009), pp. 260–276 V. Lallemand, M. Naya-Plasencia, Cryptanalysis of full sprout, in Annual Cryptology Conference (Springer, 2015), pp. 663–682 G. Leander, On linear hulls, statistical saturation attacks, present and a cryptanalysis of puffin, in Annual International Conference on the Theory and Applications of Cryptographic Techniques (Springer, 2011), pp. 303–322 B. Muthuswamy, Int. J. Bifurcation Chaos 20, 1335 (2010) C. Zheng, H.H.C. Iu, T. Fernando, D. Yu, H. Guo, J.K. Eshraghian, Chaos: Interdisciplinary J. Nonlinear Sci. 28, 063115 (2018) T. Yang, C.W. Wu, L.O. Chua, IEEE Trans. Circuits Syst. I: Fundam. Theor. App. 44, 469 (1997) M.T. Arafin, C. Dunbar, G. Qu, N. McDonald, L. Yan, A survey on memristor modeling and security applications, in Sixteenth International Symposium on Quality Electronic Design (IEEE, 2015), pp. 440–447 B. Wang, F.C. Zou, J. Cheng, Optik 154, 538 (2018) W.J. Miller, N.G. Trbovich, RSA Public-key Data Encryption System Having Large Random Prime Number Generating Microprocessor or the Like (September 28, 1982), yUS Patent 4,351,982 F. Corinto, V. Krulikovskyi, S.D. Haliuk, Memristor-based chaotic circuit for pseudo-random sequence generators, in 2016 18th Mediterranean Electrotechnical Conference (MELECON) (IEEE, 2016), pp. 1–3 R. Maes, Physically Unclonable Functions (Springer, 2016) G. Edward Suh, S. Devadas, Physical unclonable functions for device authentication and secret key generation, in 2007 44th ACM/IEEE Design Automation Conference (IEEE, 2007), pp. 9–14 N. Beckmann, M. Potkonjak, Hardware-based public-key cryptography with public physically unclonable functions, in International Workshop on Information Hiding (Springer, 2009), pp. 206–220 R. Maes, I. Verbauwhede, Physically unclonable functions: a study on the state of the art and future research directions, in Towards Hardware-Intrinsic Security (Springer, 2010), pp. 3–37 J. Rajendran, G.S. Rose, R. Karri, M. Potkonjak, Nano-PPUF: a memristor-based security primitive, in 2012 IEEE Computer Society Annual Symposium on VLSI (IEEE, 2012), pp. 84–87 Y. Gao, D.C. Ranasinghe, S.F. Al-Sarawi, O. Kavehei, D. Abbott, IEEE Access 4, 61 (2016) A. Mazady, M.T. Rahman, D. Forte, M. Anwar, IEEE J. Emerg. Sel. Top. Circuits Syst. 5, 222 (2015) M.T. Arafin, G. Qu, IEEE Trans. Very Large Scale Integr. VLSI Syst. 99, 1 (2018) M. Uddin, M.D. Majumder, K. Beckmann, H. Manem, Z. Alamgir, N.C. Cady, G.S. Rose, ACM J. Emerg. Technol. Comput. Syst. (JETC) 14, 2 (2018) A. Maiti, P. Schaumont, J. Cryptol. 24, 375 (2011) S. Tajik, E. Dietz, S. Frohmann, J.-P. Seifert, D. Nedospasov, C. Helfmeier, C. Boit, H. Dittrich, Physical characterization of arbiter PUFs, in International Workshop on Cryptographic Hardware and Embedded Systems (Springer, 2014), pp. 493–509 A. Garg, T.T. Kim, Design of sram puf with improved uniformity and reliability utilizing device aging effect, in 2014 IEEE International Symposium on Circuits and Systems (ISCAS) (IEEE, 2014), pp. 1941–1944 R. Zhang, H. Jiang, Z.R. Wang, P. Lin, Y. Zhuo, D. Holcomb, D.H. Zhang, J.J. Yang, Q. Xia, Nanoscale 10, 2721 (2018) H. Nili, G.C. Adam, B. Hoskins, M. Prezioso, J. Kim, M. Reza Mahmoodi, F.M. Bayat, O. Kavehei, D.B. Strukov, Nat. Electron. 1, 197 (2018) Y. Gao, C. Jin, J. Kim, H. Nili, X. Xu, W. Burleson, O. Kavehei, M. van Dijk, D.C. Ranasinghe, U. Rührmair, Efficient erasable PUFs from programmable logic and memristors, IACR Cryptol. ePrint Arch. 2018, 358 (2018) S. Kvatinsky, L. Azriel, Memristive Security Hash Function (November 1, 2018), US Patent App. 15/965,924 L. Azriel, S. Kvatinsky, Towards a memristive hardware secure hash function (memhash), in 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (IEEE, 2017), pp. 51–55