On physical obfuscation of cryptographic algorithms

7Citations
Citations of this article
29Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We describe a solution for physically obfuscating the representation of a cipher, to augment chips resistance against physical threats, by combining ideas from masking techniques and Physical Obfuscated Keys (POKs). With embedded chips - like RFID tags - as main motivation, we apply this strategy to the representation of a Linear Feedback Shift Register (LFSR). The application of this technique to LFSR-based stream ciphers, such as the Self Shrinking Generator, enables to share key materials between several chips within a system while increasing the resistance of the system against compromise of chips. An extension of our ideas to non-linear ciphers is also presented with an illustration onto Trivium. © 2009 Springer-Verlag.

Author supplied keywords

Cite

CITATION STYLE

APA

Bringer, J., Chabanne, H., & Icart, T. (2009). On physical obfuscation of cryptographic algorithms. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5922 LNCS, pp. 88–103). https://doi.org/10.1007/978-3-642-10628-6_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free