2018
DOI: 10.3390/cryptography2010006
|View full text |Cite
|
Sign up to set email alerts
|

Can Ternary Computing Improve Information Assurance?

Abstract: Abstract:Modern computer microarchitectures build on well-established foundations that have encouraged a pattern of computational homogeneity that many cyberattacks depend on. We suggest that balanced ternary logic can be valuable to Internet of Things (IoT) security, authentication of connected vehicles, as well as hardware and software assurance, and have developed a ternary encryption scheme between a computer and smartcard based on public key exchange through non-secure communication channels to demonstrat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 31 publications
(9 citation statements)
references
References 34 publications
(40 reference statements)
0
9
0
Order By: Relevance
“…Such error correcting protocols also increase the vulnerability to differential power analysis that leak information to opponents. With ternary PUFs [1,50], when the fuzzy "X" states are blanked, CRP error rates are typically reduced by two orders of magnitudes to the 10 −3 range, which greatly simplifies the entire error correcting protocol. Conversely, when the "X" values are selected, CRP error rates are higher, which can be used as a feature when HPC is used to handle the erratic keys as presented below.…”
Section: Ternary Physical Unclonable Functionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Such error correcting protocols also increase the vulnerability to differential power analysis that leak information to opponents. With ternary PUFs [1,50], when the fuzzy "X" states are blanked, CRP error rates are typically reduced by two orders of magnitudes to the 10 −3 range, which greatly simplifies the entire error correcting protocol. Conversely, when the "X" values are selected, CRP error rates are higher, which can be used as a feature when HPC is used to handle the erratic keys as presented below.…”
Section: Ternary Physical Unclonable Functionsmentioning
confidence: 99%
“…We use mainstream "binary hardware" to be able to use off-the-shelf systems. Ternary computing with binary infrastructure can be valuable for cryptography [1]. The third state of ternary logic is especially important in our cryptographic protocol and offers additional layers of security and increases the level of entropy, i.e., randomness.…”
Section: Introduction and Objectivesmentioning
confidence: 99%
“…Ternary computing uses trits, for example (0, 1, 2) or balanced (-, 0, +), instead of the bits (0, 1) used in binary computing [61][62][63][64][65][66][67]. Can ternary computing improve cybersecurity and Information Assurance [68][69][70]? Ternary computing is not a new concept, and is more complex to implement than binary computing.…”
Section: Native Ternary Random Numbers Generatorsmentioning
confidence: 99%
“…Digital circuits are used in many areas, including telecommunications, signal processing, biomedical, and machine learning [1]- [4]. Although multi-value logic, or simply MVL, has been the subject of much research [5]- [7] as a possible evolution of two-based systems, there has been no realization that it can supplant a traditional digital processing system. Some think that there are technical and economic reasons that do not permit its success [8].…”
Section: Introductionmentioning
confidence: 99%