Download presentation
Presentation is loading. Please wait.
Published byPreston Lyons Modified over 9 years ago
1
Secure storage of cryptographic keys within random volumetric materials Roarke Horstmeyer 1, Benjamin Judkewitz 1, Ivo Vellekoop 2 and Changhuei Yang 1 1 California Institute of Technology, Pasadena, CA 2 University of Twente, Enschede, The Netherlands
2
Goal: Create an ideally secure link between two communicators without relying upon the security of digital electronic storage
3
-Ideal security “information-theoretic” security 1 [1] Shannon, C. Bell System Technical Journal 28, 656–715 (1949).
4
Goal: Create an ideally secure link between two communicators without relying upon the security of digital electronic storage -Ideal security -Well-established solution: the one-time pad “information-theoretic” security 1 Message: Random key: 00 0111 … 01 0011 … [1] Shannon, C. Bell System Technical Journal 28, 656–715 (1949).
5
Goal: Create an ideally secure link between two communicators without relying upon the security of digital electronic storage -Ideal security -Well-established solution: the one-time pad “information-theoretic” security 1 Message: Random key: 00 0111 … 01 0011 … Ciphertext: 01 0100 … = XOR operation [1] Shannon, C. Bell System Technical Journal 28, 656–715 (1949).
6
Goal: Create an ideally secure link between two communicators without relying upon the security of digital electronic storage -Ideal security -Well-established solution: the one-time pad “information-theoretic” security 1 Message: Random key: 00 0111 … 01 0011 … Ciphertext: 01 0100 … = XOR operation [1] Shannon, C. Bell System Technical Journal 28, 656–715 (1949).
7
Goal: Create an ideally secure link between two communicators without relying upon the security of digital electronic storage -Ideal security -Well-established solution: the one-time pad “information-theoretic” security 1 Message: Random key: 00 0111 … 01 0011 … Ciphertext: Limitations: “Really long” key is hard to generate and store 01 0100 … = XOR operation [1] Shannon, C. Bell System Technical Journal 28, 656–715 (1949).
8
Goal: Create an ideally secure link between two communicators without relying upon the security of digital electronic storage Digital electronic memory: insecure Tools: Imaging, freezing, probing, overwriting… Goals: Key copying, alteration, viruses…
9
Digital electronic memory: insecure Tools: Imaging, freezing, probing, overwriting… Goals: Key copying, alteration, viruses… Goal: Create an ideally secure link between two communicators without relying upon the security of digital electronic storage
10
Digital electronic memory: insecure Solution: volumetric optical scattering Tools: Imaging, freezing, probing, overwriting… Goals: Key copying, alteration, viruses… coherent light unique speckle Goal: Create an ideally secure link between two communicators without relying upon the security of digital electronic storage
11
Digital electronic memory: insecure Tools: Imaging, freezing, probing, overwriting… Goals: Key copying, alteration, viruses… Δθ ~ λ/2π a a Uncorrelated speckle Solution: volumetric optical scattering Goal: Create an ideally secure link between two communicators without relying upon the security of digital electronic storage
12
Digital electronic memory: insecure Tools: Imaging, freezing, probing, overwriting… Benefits -Sensitive 3D structure -High density (1 Tb/mm 3 ) -“Cheap” entropy Goals: Key copying, alteration, viruses Solution: volumetric optical scattering “key database” Goal: Create an ideally secure link between two communicators without relying upon the security of digital electronic storage
13
Previous Work Optical encryption methods Secure storage Our Goal Information- theoretic security Keys cannot be copied, cloned Challenging to use a stolen device Requires digital key storage Pappu et al., Science 297 (2001) Skoric et al., Applied Crypto. & Network Sec. 3531 (2005) Not for communication - Digital electronic security - IC, FPGA, RFID - Random variations in fab. process - Fiber-based protocols - Quantum key distribution - Optical random number generation Limitations - Optical storage for ID, authentication
14
Our setup
15
“key database”
16
Our setup “key database” Input: n random SLM patterns Output: n speckle images
17
Mathematical model pipi riri T = scattering transmission matrix 2 riri = Display Image
18
Mathematical model pipi riri Pixel value Speckle Intensity Histogram Probability Speckle Image r i T = scattering transmission matrix 2 riri =
19
Mathematical model Digital “whitening” (public) pipi riri T = scattering transmission matrix 2 riri =
20
Mathematical model Digital “whitening” (public) pipi riri T = scattering transmission matrix 2 riri = W = sparse binary matrix (digital, public) Image Key
21
Verification of speckle key randomness -Statistical randomness test suites: Diehard 1 and NIST 2 -12 different 10 Gb keys k tested -Stats comparable to state-of-the-art random number generators Table 1 | Example NIST statistical randomness test performance. NIST statistical randomness test package performance of a typical 10-gigabit sequence of random CPUF data, split into 10,000 unique 1 megabit sequences following a common procedure 11,12. For ‘success’ using 10,000 samples of 10 6 bit sequences and significance level α =0.01, the p-value (uniformity of p-values) should be larger than 0.0001 and the minimum pass rate is 0.987015. [1] Marsaglia, G. http://stat.fsu.edu/pub/diehard (1996). [2] Rukhin, A. et. al, National Institute of Standards and Technology Special Publication 800-22 (2001).
22
Securely linking two devices for communication Each device is unique – how to implement the one-time pad between two parties?
23
Securely linking two devices for communication Each device is unique – how to implement the one-time pad between two parties? Scat.
24
Securely linking two devices for communication Each device is unique – how to implement the one-time pad between two parties? Communication achieved through an information-theoretically secure key-pair Scat.
25
Securely linking two devices for communication Dictionary Setup 1. Alice and Bob securely connect devices 2. Display p 1..n 3. Publically save XOR of keys k 1..n (A) k 1..n (B) Alice’s device Bob’s device
26
Securely linking two devices for communication Dictionary Setup 1. Alice and Bob securely connect devices 2. Display p 1..n 3. Publically save XOR of keys k 1..n (A) k 1..n (B) Alice’s device Bob’s device OTP ciphertext: ideally secure
27
Securely linking two devices for communication Alice sends Bob a message 1. Alice randomly selects p, creates k(A) and computes ( k(A) m ) 2. Alice sends (k(A) m) and p 3. Bob creates k(B), looks up ( k(A) k(B) ) 4. Bob computes: k(B) ( k(A) k(B) ) (k(A) m) = m Alice’s device Bob’s device
28
Experimental demonstration Key size: 10 Gb (100 Gb unverified) Duration: 24 hours Attack time: ~50 hours Noise: ~20% bits flipped* *after error correction
29
Conclusion and future work Future work -Public key variant -Detailed security analysis R. Horstmeyer, “Physical key-protected one-time pad,” arxiv:1305:3886 (2013) - Non-electronic storage of 10 Gb over 24 hours - New protocol for “physical memory” -Information-theoretic security -Linking physical disorder Thank You!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.