Mathematical Mappings for Identification Mechanisms
Saleh Mulhem, Universitätsbibliothek Braunschweig, Wael Adi
Secured physically unclonable entities are emerging to play major role in future security systems. Embedding such unclonable entities as integral system component allow to counteract and trace securely a large class of attacks on contemporary networks and systems. Therefore, there is a crying need for low-cost and practically usable and physically clone-resistant or unclonable electronic and/or mechatronic units. Analog Physical Unclonable Functions (PUFs) were introduced two decades ago as DNA-like born units material properties mainly in electronic units to make them hard to clone. PUFs however, as analog entities, suffer from long-term inconsistency due to aging, operational conditions and other factors. This lead to limiting the practical use of PUFs due to their high-complexity and inherent inconsistency. The digital Secret Unknown Cipher (SUC) concept was introduced a decade ago by a research team at the technical university of Braunschweig as a low-cost and consistent alternative to the conventional analog PUF. SUCs were concepted to be self-created in a single-event, non-repeatable process within electronic devices as clone-resistant modules. The modules represent self-created unknown operational ciphers which may serve as DNA-like biological identities which are hard to duplicate and are securely identifiable. The SUC-concept is an entirely new technology-based security paradigm in the public literature. The new paradigm assumes that the only perfect secrets are those which nobody knows. Such secrets in a practical sense, can only be reached by physical invasive attacks or by exhaustive search requiring infeasible complexity.
Archived Files and Locations
|application/pdf 4.4 MB ||
access all versions, variants, and formats of this works (eg, pre-prints)
Datacite Metadata (via API)