Towards a new design of ciphers to secure CPS: the role of control theory
Among several solutions to face the unprecedented increase of attacks towards Cyber Physical Systems, encryption plays a central role. In the form of a Proof of Concept, this contribution gives a new methodology for designing self-synchronizing automata, having in mind their use in symmetric cryptog...
Uložené v:
| Vydané v: | 2022 26th International Conference on System Theory, Control and Computing (ICSTCC) s. 13 - 18 |
|---|---|
| Hlavní autori: | , , |
| Médium: | Konferenčný príspevok.. |
| Jazyk: | English |
| Vydavateľské údaje: |
IEEE
19.10.2022
|
| Predmet: | |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | Among several solutions to face the unprecedented increase of attacks towards Cyber Physical Systems, encryption plays a central role. In the form of a Proof of Concept, this contribution gives a new methodology for designing self-synchronizing automata, having in mind their use in symmetric cryptography, namely the Self-Synchronizing Stream Ciphers. The contribution of the paper is to recast the design as control theoretical issues. It calls for a graph-based approach and results borrowed from control theory and dynamical systems, in particular LPV systems. The design leads to not necessarily T -functions as state transition functions of the automata involved in the ciphering and deciphering sides. It is a consideration that is important for the sake of security. Another asset of the approach is that the resulting ciphers admit possibly vectorial inputs to enhance the throughput. |
|---|---|
| AbstractList | Among several solutions to face the unprecedented increase of attacks towards Cyber Physical Systems, encryption plays a central role. In the form of a Proof of Concept, this contribution gives a new methodology for designing self-synchronizing automata, having in mind their use in symmetric cryptography, namely the Self-Synchronizing Stream Ciphers. The contribution of the paper is to recast the design as control theoretical issues. It calls for a graph-based approach and results borrowed from control theory and dynamical systems, in particular LPV systems. The design leads to not necessarily T -functions as state transition functions of the automata involved in the ciphering and deciphering sides. It is a consideration that is important for the sake of security. Another asset of the approach is that the resulting ciphers admit possibly vectorial inputs to enhance the throughput. |
| Author | Boukerrou, Hamid Millerioux, Gilles Minier, Marine |
| Author_xml | – sequence: 1 givenname: Hamid surname: Boukerrou fullname: Boukerrou, Hamid email: hamid.boukerrou@univ-lorraine.fr organization: Universite de Lorraine, CNRS, CRAN,Nancy,France,F-54000 – sequence: 2 givenname: Gilles surname: Millerioux fullname: Millerioux, Gilles email: gilles.millerioux@univ-lorraine.fr organization: Universite de Lorraine, CNRS, CRAN,Nancy,France,F-54000 – sequence: 3 givenname: Marine surname: Minier fullname: Minier, Marine email: marine.minier@loria.fr organization: Universite de Lorraine, CNRS, Inria, LORIA,Nancy,France,F-54000 |
| BookMark | eNotj91Kw0AUhFewF1r7BN6cF0g8-5_1ThZ_AgWFptdlk5yYQM2WTaT07a3aq5n5GAbmll2PcSTGgGPOObqH0m8q77VWwuQChcidk7yw8oqtnC24MVoZq4y7YWUVjyG1EwQY6QgtTcPnCLGDZjj0lCaYI0zUfCcC_7F5hLknSHFPf5U4zmf_y2I63bFFF_YTrS66ZNuX58q_Zev319I_rbNeSDtnFtHUNoSWK6M7J9AZ3QSJkizWwdWFtKgILaHpdFc47lTLheBKtQ0R1XLJ7v93h3PcHdLwFdJpdzkofwDWnkpH |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/ICSTCC55426.2022.9931873 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 9781665467469 1665467460 |
| EndPage | 18 |
| ExternalDocumentID | 9931873 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IL CBEJK RIE RIL |
| ID | FETCH-LOGICAL-h237t-7006b7aad1465f920965ca303e70ba9b83704e07e06f5f89194d122144dceeeb3 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000889980600003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| IngestDate | Thu Jan 18 11:15:06 EST 2024 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-h237t-7006b7aad1465f920965ca303e70ba9b83704e07e06f5f89194d122144dceeeb3 |
| PageCount | 6 |
| ParticipantIDs | ieee_primary_9931873 |
| PublicationCentury | 2000 |
| PublicationDate | 2022-Oct.-19 |
| PublicationDateYYYYMMDD | 2022-10-19 |
| PublicationDate_xml | – month: 10 year: 2022 text: 2022-Oct.-19 day: 19 |
| PublicationDecade | 2020 |
| PublicationTitle | 2022 26th International Conference on System Theory, Control and Computing (ICSTCC) |
| PublicationTitleAbbrev | ICSTCC |
| PublicationYear | 2022 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| Score | 1.812567 |
| Snippet | Among several solutions to face the unprecedented increase of attacks towards Cyber Physical Systems, encryption plays a central role. In the form of a Proof... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 13 |
| SubjectTerms | Automata Ciphers Control theory Cyber-Physical Systems Cybersecurity Design methodology Encryption Flatness Generators LPV systems Structural Analysis Throughput |
| Title | Towards a new design of ciphers to secure CPS: the role of control theory |
| URI | https://ieeexplore.ieee.org/document/9931873 |
| WOSCitedRecordID | wos000889980600003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NawIxEB1UeuipLVr6TQ49NrqbjZuk16VSLyJowZvkY5Z6cYu7Cv33TaK1FHrpLYRAwoTMmyRv3gA8opKhRBij1mY55cpk1HAnaMJTUyrmeIYuFpsQk4lcLNS0BU_HXBhEjOQz7Idm_Mt3ld2Gp7KBx9JUiqwNbSHEPlfrm5yTqMG4mM2LwsMjC9QDxvqH4b_qpkTYGJ39b8Jz6P3k35HpEVkuoIXrLoznkeFaE018KExcpF6QqiR2FaQBatJUpA6v50iK6eyZ-MiOBO5gHLInpJOYtvjZg7fRy7x4pYdCCPSdZaKhwh8NI7R23q0NvQWDYovVHnxQJEYrEwRsOCYCk7wcllKliruUBTE051fqr8uX0FlXa7wCkpiSSdQ6MXnOpZEKfYTkBNNW-W0x5TV0gxmWH3uti-XBAjd_d9_CabB08OWpuoNOs9niPZzYXbOqNw9xg74Al8SSiA |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwFH7MKehJZRN_m4NHu7Vp1iRei2PDOQarsNtImlfcZZW1E_zvTbI5Ebx4CyEh4YXke0m-9z2Ae5TCpQijQZ7HScCkjgPNDA9CFulCUsNiND7ZBB-PxWwmJw142MXCIKInn2HHFf1fvinztXsq61osjQSP92C_xxiNNtFa3_ScUHaH6TRLUwuQ1JEPKO1sO_zKnOKBo3_8vyFPoP0TgUcmO2w5hQYuWzDMPMe1IopYZ5gYT74gZUHyhRMHqEhdksq9nyNJJ9NHYn074tiDvsmGkk584OJnG177T1k6CLapEII3GvM64HZzaK6UsQdbz9rQabbkysIP8lArqZ2EDcOQY5gUvULISDITUSeHZuxM7YX5DJrLconnQEJdUIFKhTpJmNBCovWRDKcql3ZhdHEBLWeG-ftG7WK-tcDl39V3cDjIXkbz0XD8fAVHzuruZI_kNTTr1Rpv4CD_qBfV6tYv1hdnz5XP |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2022+26th+International+Conference+on+System+Theory%2C+Control+and+Computing+%28ICSTCC%29&rft.atitle=Towards+a+new+design+of+ciphers+to+secure+CPS%3A+the+role+of+control+theory&rft.au=Boukerrou%2C+Hamid&rft.au=Millerioux%2C+Gilles&rft.au=Minier%2C+Marine&rft.date=2022-10-19&rft.pub=IEEE&rft.spage=13&rft.epage=18&rft_id=info:doi/10.1109%2FICSTCC55426.2022.9931873&rft.externalDocID=9931873 |