TY - GEN
T1 - Ternary computing to strengthen cybersecurity
T2 - Computing Conference, 2018
AU - Cambou, Bertrand
AU - Telesca, Donald
N1 - Funding Information:
The authors are thanking the students and faculty from Northern Arizona University, in particular Christopher Philabaum, Duane Booher, Bilal Habib, Raul Chipana, Paul Flikkema, and James Palmer. We are also thanking the professionals of the Air Force Research lab of Rome, NY, and Alion science and Technology, who supported this effort. Aknowledgment of Support and Disclaimer. (a) Contractor acknowledges Government’s support in the publication of this paper. This material is based upon work funded by the Information Directorate, under AFRL Contract No. FA8075-16-D-0001. (b) Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of AFRL.
Funding Information:
Acknowledgment. The authors are thanking the students and faculty from Northern Arizona University, in particular Christopher Philabaum, Duane Booher, Bilal Habib, Raul Chipana, Paul Flikkema, and James Palmer. We are also thanking the professionals of the Air Force Research lab of Rome, NY, and Alion science and Technology, who supported this effort. Aknowledgment of Support and Disclaimer. (a) Contractor acknowledges Government’s support in the publication of this paper. This material is based upon work funded by the Information Directorate, under AFRL Contract No. FA8075-16-D-0001. (b) Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of AFRL.
Publisher Copyright:
© Springer Nature Switzerland AG 2019.
PY - 2019
Y1 - 2019
N2 - In this key exchange scheme for a public key infrastructure, the initialization step or “personalization” is based on the secure exchange of addressable cryptographic tables between the communicating parties. The content of these tables is generated either with ternary random numbers, or with arrays of addressable physical unclonable functions having ternary states, which we are generating with memristors. Private keys are generated independently with the shared public keys by all communicating parties, with their ternary cryptographic tables. Public and private key pairs, which are used for authentication and cryptography, are binary streams while the core of the scheme is based on ternary logic. The communication between parties can occur over untrusted channels, by exchanging dynamically generated public keys, and using legacy binary codes. The ternary computing environment largely enhances entropy, and creates additional levels of cybersecurity.
AB - In this key exchange scheme for a public key infrastructure, the initialization step or “personalization” is based on the secure exchange of addressable cryptographic tables between the communicating parties. The content of these tables is generated either with ternary random numbers, or with arrays of addressable physical unclonable functions having ternary states, which we are generating with memristors. Private keys are generated independently with the shared public keys by all communicating parties, with their ternary cryptographic tables. Public and private key pairs, which are used for authentication and cryptography, are binary streams while the core of the scheme is based on ternary logic. The communication between parties can occur over untrusted channels, by exchanging dynamically generated public keys, and using legacy binary codes. The ternary computing environment largely enhances entropy, and creates additional levels of cybersecurity.
KW - Authentication
KW - Cryptography
KW - Cybersecurity
KW - Memristors
KW - Physical unclonable function
KW - Public key infrastructure
KW - Ternary computing
KW - Ternary logic states
UR - http://www.scopus.com/inward/record.url?scp=85057129389&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85057129389&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-01177-2_67
DO - 10.1007/978-3-030-01177-2_67
M3 - Conference contribution
AN - SCOPUS:85057129389
SN - 9783030011765
T3 - Advances in Intelligent Systems and Computing
SP - 898
EP - 919
BT - Intelligent Computing - Proceedings of the 2018 Computing Conference
A2 - Kapoor, Supriya
A2 - Bhatia, Rahul
A2 - Arai, Kohei
PB - Springer-Verlag
Y2 - 10 July 2018 through 12 July 2018
ER -