Ternary computing to strengthen cybersecurity: Development of ternary state based public key exchange

Bertrand Cambou, Donald Telesca

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Scopus citations

Abstract

In this key exchange scheme for a public key infrastructure, the initialization step or “personalization” is based on the secure exchange of addressable cryptographic tables between the communicating parties. The content of these tables is generated either with ternary random numbers, or with arrays of addressable physical unclonable functions having ternary states, which we are generating with memristors. Private keys are generated independently with the shared public keys by all communicating parties, with their ternary cryptographic tables. Public and private key pairs, which are used for authentication and cryptography, are binary streams while the core of the scheme is based on ternary logic. The communication between parties can occur over untrusted channels, by exchanging dynamically generated public keys, and using legacy binary codes. The ternary computing environment largely enhances entropy, and creates additional levels of cybersecurity.

Original languageEnglish (US)
Title of host publicationIntelligent Computing - Proceedings of the 2018 Computing Conference
EditorsSupriya Kapoor, Rahul Bhatia, Kohei Arai
PublisherSpringer-Verlag
Pages898-919
Number of pages22
ISBN (Print)9783030011765
DOIs
StatePublished - 2019
EventComputing Conference, 2018 - London, United Kingdom
Duration: Jul 10 2018Jul 12 2018

Publication series

NameAdvances in Intelligent Systems and Computing
Volume857
ISSN (Print)2194-5357

Conference

ConferenceComputing Conference, 2018
Country/TerritoryUnited Kingdom
CityLondon
Period7/10/187/12/18

Keywords

  • Authentication
  • Cryptography
  • Cybersecurity
  • Memristors
  • Physical unclonable function
  • Public key infrastructure
  • Ternary computing
  • Ternary logic states

ASJC Scopus subject areas

  • Control and Systems Engineering
  • General Computer Science

Fingerprint

Dive into the research topics of 'Ternary computing to strengthen cybersecurity: Development of ternary state based public key exchange'. Together they form a unique fingerprint.

Cite this