Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

SIMPL systems as a keyless cryptographic and security primitive

 
: Rührmair, U.

:

Naccache, D.:
Cryptography and Security: From Theory to Applications : Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday
Berlin, Heidelberg: Springer, 2012 (Lecture Notes in Computer Science 6805)
ISBN: 978-3-642-28367-3 (print)
ISBN: 978-3-642-28368-0
ISSN: 0302-9743
pp.329-354
English
Book Article
Fraunhofer SIT ()

Abstract
We discuss a recent cryptographic primitive termed SIMPL system, where the acronym stands for SIMulation Possible, but Laborious. Like Physical Unclonable Functions (PUFs), SIMPL systems are disordered, unclonable physical systems with many possible inputs and a complex input-output behavior. Contrary to PUFs, however, each SIMPL system comes with a publicly known, individual numeric description that allows its slow simulation and output prediction. While everyone can determine a SIMPL system's output slowly by simulation, only its actual holder can determine the output fast by physical measurement. This added functionality allows new public key like protocols and applications. But SIMPLs have a second, perhaps more striking advantage: No secret information is, or needs to be, contained in SIMPL systems in order to enable cryptographic security. Neither in the form of a standard digital key, nor as secret information hidden in the random, analog features of some hardwar e, as it is the case for PUFs. The security of SIMPL systems instead rests on (i) an assumption regarding their physical unclonability, and (ii) a computational assumption on the complexity of simulating their output. This provides SIMPL systems with a natural immunity against any key extraction attacks, including malware, side channel, invasive, and modeling attempts. In this manuscript, we give a comprehensive discussion of SIMPLs as a cryptographic and security primitive. Special emphasis is placed on the different cryptographic protocols that are enabled by this new tool.

: http://publica.fraunhofer.de/documents/N-206815.html