Towards a new design of ciphers to secure CPS: the role of control theory

Among several solutions to face the unprecedented increase of attacks towards Cyber Physical Systems, encryption plays a central role. In the form of a Proof of Concept, this contribution gives a new methodology for designing self-synchronizing automata, having in mind their use in symmetric cryptog...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:2022 26th International Conference on System Theory, Control and Computing (ICSTCC) s. 13 - 18
Hlavní autori: Boukerrou, Hamid, Millerioux, Gilles, Minier, Marine
Médium: Konferenčný príspevok..
Jazyk:English
Vydavateľské údaje: IEEE 19.10.2022
Predmet:
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract Among several solutions to face the unprecedented increase of attacks towards Cyber Physical Systems, encryption plays a central role. In the form of a Proof of Concept, this contribution gives a new methodology for designing self-synchronizing automata, having in mind their use in symmetric cryptography, namely the Self-Synchronizing Stream Ciphers. The contribution of the paper is to recast the design as control theoretical issues. It calls for a graph-based approach and results borrowed from control theory and dynamical systems, in particular LPV systems. The design leads to not necessarily T -functions as state transition functions of the automata involved in the ciphering and deciphering sides. It is a consideration that is important for the sake of security. Another asset of the approach is that the resulting ciphers admit possibly vectorial inputs to enhance the throughput.
AbstractList Among several solutions to face the unprecedented increase of attacks towards Cyber Physical Systems, encryption plays a central role. In the form of a Proof of Concept, this contribution gives a new methodology for designing self-synchronizing automata, having in mind their use in symmetric cryptography, namely the Self-Synchronizing Stream Ciphers. The contribution of the paper is to recast the design as control theoretical issues. It calls for a graph-based approach and results borrowed from control theory and dynamical systems, in particular LPV systems. The design leads to not necessarily T -functions as state transition functions of the automata involved in the ciphering and deciphering sides. It is a consideration that is important for the sake of security. Another asset of the approach is that the resulting ciphers admit possibly vectorial inputs to enhance the throughput.
Author Boukerrou, Hamid
Millerioux, Gilles
Minier, Marine
Author_xml – sequence: 1
  givenname: Hamid
  surname: Boukerrou
  fullname: Boukerrou, Hamid
  email: hamid.boukerrou@univ-lorraine.fr
  organization: Universite de Lorraine, CNRS, CRAN,Nancy,France,F-54000
– sequence: 2
  givenname: Gilles
  surname: Millerioux
  fullname: Millerioux, Gilles
  email: gilles.millerioux@univ-lorraine.fr
  organization: Universite de Lorraine, CNRS, CRAN,Nancy,France,F-54000
– sequence: 3
  givenname: Marine
  surname: Minier
  fullname: Minier, Marine
  email: marine.minier@loria.fr
  organization: Universite de Lorraine, CNRS, Inria, LORIA,Nancy,France,F-54000
BookMark eNotj91Kw0AUhFewF1r7BN6cF0g8-5_1ThZ_AgWFptdlk5yYQM2WTaT07a3aq5n5GAbmll2PcSTGgGPOObqH0m8q77VWwuQChcidk7yw8oqtnC24MVoZq4y7YWUVjyG1EwQY6QgtTcPnCLGDZjj0lCaYI0zUfCcC_7F5hLknSHFPf5U4zmf_y2I63bFFF_YTrS66ZNuX58q_Zev319I_rbNeSDtnFtHUNoSWK6M7J9AZ3QSJkizWwdWFtKgILaHpdFc47lTLheBKtQ0R1XLJ7v93h3PcHdLwFdJpdzkofwDWnkpH
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICSTCC55426.2022.9931873
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781665467469
1665467460
EndPage 18
ExternalDocumentID 9931873
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-h237t-7006b7aad1465f920965ca303e70ba9b83704e07e06f5f89194d122144dceeeb3
IEDL.DBID RIE
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000889980600003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
IngestDate Thu Jan 18 11:15:06 EST 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-h237t-7006b7aad1465f920965ca303e70ba9b83704e07e06f5f89194d122144dceeeb3
PageCount 6
ParticipantIDs ieee_primary_9931873
PublicationCentury 2000
PublicationDate 2022-Oct.-19
PublicationDateYYYYMMDD 2022-10-19
PublicationDate_xml – month: 10
  year: 2022
  text: 2022-Oct.-19
  day: 19
PublicationDecade 2020
PublicationTitle 2022 26th International Conference on System Theory, Control and Computing (ICSTCC)
PublicationTitleAbbrev ICSTCC
PublicationYear 2022
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.812567
Snippet Among several solutions to face the unprecedented increase of attacks towards Cyber Physical Systems, encryption plays a central role. In the form of a Proof...
SourceID ieee
SourceType Publisher
StartPage 13
SubjectTerms Automata
Ciphers
Control theory
Cyber-Physical Systems
Cybersecurity
Design methodology
Encryption
Flatness
Generators
LPV systems
Structural Analysis
Throughput
Title Towards a new design of ciphers to secure CPS: the role of control theory
URI https://ieeexplore.ieee.org/document/9931873
WOSCitedRecordID wos000889980600003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NawIxEB1UeuipLVr6TQ49NrqbjZuk16VSLyJowZvkY5Z6cYu7Cv33TaK1FHrpLYRAwoTMmyRv3gA8opKhRBij1mY55cpk1HAnaMJTUyrmeIYuFpsQk4lcLNS0BU_HXBhEjOQz7Idm_Mt3ld2Gp7KBx9JUiqwNbSHEPlfrm5yTqMG4mM2LwsMjC9QDxvqH4b_qpkTYGJ39b8Jz6P3k35HpEVkuoIXrLoznkeFaE018KExcpF6QqiR2FaQBatJUpA6v50iK6eyZ-MiOBO5gHLInpJOYtvjZg7fRy7x4pYdCCPSdZaKhwh8NI7R23q0NvQWDYovVHnxQJEYrEwRsOCYCk7wcllKliruUBTE051fqr8uX0FlXa7wCkpiSSdQ6MXnOpZEKfYTkBNNW-W0x5TV0gxmWH3uti-XBAjd_d9_CabB08OWpuoNOs9niPZzYXbOqNw9xg74Al8SSiA
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwFH7MKehJZRN_m4NHu7Vp1iRei2PDOQarsNtImlfcZZW1E_zvTbI5Ebx4CyEh4YXke0m-9z2Ae5TCpQijQZ7HScCkjgPNDA9CFulCUsNiND7ZBB-PxWwmJw142MXCIKInn2HHFf1fvinztXsq61osjQSP92C_xxiNNtFa3_ScUHaH6TRLUwuQ1JEPKO1sO_zKnOKBo3_8vyFPoP0TgUcmO2w5hQYuWzDMPMe1IopYZ5gYT74gZUHyhRMHqEhdksq9nyNJJ9NHYn074tiDvsmGkk584OJnG177T1k6CLapEII3GvM64HZzaK6UsQdbz9rQabbkysIP8lArqZ2EDcOQY5gUvULISDITUSeHZuxM7YX5DJrLconnQEJdUIFKhTpJmNBCovWRDKcql3ZhdHEBLWeG-ftG7WK-tcDl39V3cDjIXkbz0XD8fAVHzuruZI_kNTTr1Rpv4CD_qBfV6tYv1hdnz5XP
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2022+26th+International+Conference+on+System+Theory%2C+Control+and+Computing+%28ICSTCC%29&rft.atitle=Towards+a+new+design+of+ciphers+to+secure+CPS%3A+the+role+of+control+theory&rft.au=Boukerrou%2C+Hamid&rft.au=Millerioux%2C+Gilles&rft.au=Minier%2C+Marine&rft.date=2022-10-19&rft.pub=IEEE&rft.spage=13&rft.epage=18&rft_id=info:doi/10.1109%2FICSTCC55426.2022.9931873&rft.externalDocID=9931873