{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:11:21Z","timestamp":1771467081823,"version":"3.50.1"},"reference-count":35,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2019,4,6]],"date-time":"2019-04-06T00:00:00Z","timestamp":1554508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>A concept for creating a large class of lightweight stream ciphers as Key Stream Generators KSGs is presented. The resulting class-size exceeds 2323 possible different KSGs. If one unknown cipher from the KSG-class is randomly picked-up and stored irreversibly within a VLSI device, the device becomes physically hard-to-clone. The selected cipher is only usable by the device itself, therefore cloning it requires an invasive attack on that particular device. Being an unknown selection out of 2323 possible KSGs, the resulting cipher is seen as a Secret Unknown Cipher (SUC). The SUC concept was presented a decade ago as a digital alternative to the inconsistent traditional analog Physically Unclonable Functions (PUFs). This work presents one possible practical self-creation technique for such PUFs as hard-to-clone unknown KSGs usable to re-identify VLSI devices. The proposed sample cipher-structure is based on non-linear merging of randomly selected 16 Nonlinear Feedback Shift Registers (NLFSRs). The created KSGs exhibit linear complexities exceeding 281 and a period exceeding 2161. The worst-case device cloning time complexity approaches 2162. A simple lightweight identification protocol for physically identifying such SUC structures in FPGA-devices is presented. The required self-reconfiguring FPGAs for embedding such SUCs are not yet available, however, expected to emerge in the near future. The security analysis and hardware complexities of the resulting clone-resistant structures are evaluated and shown to offer scalable security levels to cope even with the post-quantum cryptography.<\/jats:p>","DOI":"10.3390\/cryptography3020011","type":"journal-article","created":{"date-parts":[[2019,4,8]],"date-time":"2019-04-08T11:54:52Z","timestamp":1554724492000},"page":"11","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["New Family of Stream Ciphers as Physically Clone-Resistant VLSI-Structures"],"prefix":"10.3390","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7478-1255","authenticated-orcid":false,"given":"Ayoub","family":"Mars","sequence":"first","affiliation":[{"name":"Institute of Computer and Network Engineering, Technical University of Braunschweig, Hans-Sommer Str. 66, D-38106 Braunschweig, Germany"}]},{"given":"Wael","family":"Adi","sequence":"additional","affiliation":[{"name":"Institute of Computer and Network Engineering, Technical University of Braunschweig, Hans-Sommer Str. 66, D-38106 Braunschweig, Germany"}]}],"member":"1968","published-online":{"date-parts":[[2019,4,6]]},"reference":[{"key":"ref_1","unstructured":"Wael, A., and Ayoub, M. (2017, January 27). Physical and Mechatronic Security, Technologies and Future Trends for Vehicular Environment. Proceedings of the VDI-Fachtagung Automotive Security, VDI Berichte, N\u00fcrtingen, Germany."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Maes, R., and Verbauwhede, I. (2010). Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions. Towards Hardware-Intrinsic Security, Springer.","DOI":"10.1007\/978-3-642-14452-3_1"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Sadeghi, A.-R., Visconti, I., and Wachsmann, C. (2010). Enhancing RFID Security and Privacy by Physically Unclonable Functions. Towards Hardware-Intrinsic Security, Springer.","DOI":"10.1007\/978-3-642-14452-3_13"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Tuyls, P., and Batina, L. (2006, January 13\u201317). RFID-tags for anti-counterfeiting. Proceedings of the Cryptographers\u2019 Track at the RSA Conference, San Jose, CA, USA.","DOI":"10.1007\/11605805_8"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"\u0160koric, B., Tuyls, P., and Ophey, W. (2005, January 7\u201310). Robust key extraction from physical uncloneable functions. Proceedings of the Applied Cryptography and Network Security, New York, NY, USA.","DOI":"10.1007\/11496137_28"},{"key":"ref_6","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.-J., and Tuyls, P. (2007, January 10\u201313). FPGA Intrinsic PUFs and Their Use for IP Protection. Proceedings of the Cryptographic Hardware and Embedded Systems\u2014CHES 2007, Vienna, Austria."},{"key":"ref_7","first-page":"181","article-title":"Efficient Helper Data Key Extractor on FPGAs","volume":"5154","author":"Guajardo","year":"2008","journal-title":"Cryptogr. Hardw. Embed. Syst."},{"key":"ref_8","unstructured":"Dodis, Y., Ostrovsky, R., Reyzin, L., and Smith, A. (June, January 28). Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Nedospasov, D., Seifert, J.-P., Helfmeier, C., and Boit, C. (2013, January 20). Invasive PUF Analysis. Proceedings of the Fault Diagnosis and Tolerance in Cryptography (FDTC), Washington, DC, USA.","DOI":"10.1109\/FDTC.2013.19"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1876","DOI":"10.1109\/TIFS.2013.2279798","article-title":"PUF modeling attacks on simulated and silicon data","volume":"8","author":"Sehnke","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Merli, D., Schuster, D., Stumpf, F., and Sigl, G. (2011, January 22\u201324). Side-Channel Analysis of PUFs and Fuzzy Extractors. Proceedings of the International Conference on Trust and Trustworthy Computing, Pittsburgh, PA, USA.","DOI":"10.1007\/978-3-642-21599-5_3"},{"key":"ref_12","first-page":"632","article-title":"Combined Modeling and Side Channel Attacks on Strong PUFs","volume":"2013","author":"Mahmoud","year":"2013","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Adi, W., Mars, A., and Mulhem, S. (2017, January 12\u201314). Generic identification protocols by deploying Secret Unknown Ciphers (SUCs). Proceedings of the 2017 IEEE International Conference on Consumer Electronics\u2014Taiwan (ICCE-TW), Taipei, Taiwan.","DOI":"10.1109\/ICCE-China.2017.7991092"},{"key":"ref_14","unstructured":"Mars, A., and Adi, W. (2019). Converting NV-FPGAs into Physically Clone-Resistant Units by Digital Mutations, submitted for publication."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Mars, A., Adi, W., Mulhem, S., and Hamadaqa, E. (2017, January 6\u20138). Random stream cipher as a PUF-like identity in FPGA environment. Proceedings of the Seventh International Conference on Emerging Security Technologies (EST), Canterbury, UK.","DOI":"10.1109\/EST.2017.8090425"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Mars, A., and Adi, W. (2018, January 18\u201319). Clone-Resistant Entities for Vehicular Security. Proceedings of the IEEE 13th International Conference on Innovations in Information Technology (IIT), Al Ain, UAE.","DOI":"10.1109\/INNOVATIONS.2018.8606035"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Mars, A., and Adi, W. (2018, January 6\u20139). New Concept for Physically-Secured E-Coins Circulations. Proceedings of the 2018 NASA\/ESA Conference on Adaptive Hardware and Systems, Edinburgh, UK.","DOI":"10.1109\/AHS.2018.8541493"},{"key":"ref_18","unstructured":"Kerckhoffs, A. (2019, April 02). LA CRYPTOGRAPHIE MILITAIRE. Available online: http:\/\/www.petitcolas.net\/kerckhoffs\/la_cryptographie_militaire_i.htm."},{"key":"ref_19","unstructured":"(2019, April 02). eSTREAM, the ECRYPT Stream Cipher Project. Available online: http:\/\/www.ecrypt.eu.org\/stream\/."},{"key":"ref_20","unstructured":"Gammel, B.M., G\u00f6ttfert, R., and Kniffler, O. (2005). The Achterbahn stream cipher. eSTREAM, submitted."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Johansson, T., Meier, W., and M\u00fcller, F. (2006, January 15\u201317). Cryptanalysis of Achterbahn. Proceedings of the International Workshop on Fast Software Encryption, Graz, Austria.","DOI":"10.1007\/11799313_1"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1016\/0097-3165(82)90038-3","article-title":"On the complexities of de Bruijn sequences","volume":"33","author":"Chan","year":"1982","journal-title":"J. Comb. Theory Ser. A"},{"key":"ref_23","first-page":"166","article-title":"A List of Maximum Period NLFSRs","volume":"2012","author":"Dubrova","year":"2012","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Courtois, N.T., and Meier, W. (2003, January 4\u20138). Algebraic Attacks on Stream Ciphers with Linear Feedback. Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland.","DOI":"10.1007\/3-540-39200-9_21"},{"key":"ref_25","unstructured":"Gammel, B.M., G\u00f6ttfert, R., and Kniffler, O. (2006, January 2\u20133). Status of Achterbahn and Tweaks. Proceedings of the SASC 2006-Stream Ciphers Revisited, Leuven, Belgium."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"776","DOI":"10.1109\/TIT.1984.1056949","article-title":"Correlation-immunity of nonlinear combining functions for cryptographic applications (Corresp.)","volume":"30","author":"Siegenthaler","year":"1984","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/BF02252874","article-title":"Fast correlation attacks on certain stream ciphers","volume":"1","author":"Meier","year":"1989","journal-title":"J. Cryptol."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Courtois, N.T. (2003, January 17\u201321). Fast Algebraic Attacks on Stream Ciphers with Linear Feedback. Proceedings of the CRYPTO 2003: Advances in Cryptology, Santa Barbara, CA, USA.","DOI":"10.1007\/978-3-540-45146-4_11"},{"key":"ref_29","unstructured":"Gammel, B., G\u00f6ttfert, R., and Kniffler, O. (February, January 31). Achterbahn-128\/80: Design and analysis. Proceedings of the ECRYPT Workshop SASC 2007\u2014The State of the Art of Stream Ciphers, Bochum, Germany."},{"key":"ref_30","unstructured":"Gierlichs, B., Batina, L., Clavier, C., Eisenbarth, T., Gouget, A., Handschuh, H., Kasper, T., Lemke-Rust, K., Mangard, S., and Moradi, A. (2008, January 13). Susceptibility of eSTREAM Candidates towards Side Channel Analysis. Proceedings of the ECRYPT Workshop SASC 2008\u2013The State of the Art of Stream Ciphers, Lausanne, Switzerland."},{"key":"ref_31","unstructured":"Lano, J., Mentens, N., Preneel, B., and Verbauwhede, I. (2004, January 14\u201315). Power analysis of synchronous stream ciphers with resynchronization mechanism. Proceedings of the ECRYPT Workshop SASC 2004\u2013The State of the Art of Stream Ciphers, Brugge, Belgium."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1504\/IJWMC.2007.013798","article-title":"Grain-A Stream Cipher for Constrained Environments","volume":"2","author":"Hell","year":"2007","journal-title":"Int. J. Wirel. Mob. Comput."},{"key":"ref_33","unstructured":"Babbage, S. (2006). The stream cipher MICKEY 2.0. New Stream Cipher Designs, Springer."},{"key":"ref_34","unstructured":"De Cann\u00ecere, C., and Preneel, B. (2019, April 06). Available online: http:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.59.9030."},{"key":"ref_35","unstructured":"Good, T., and Benaissa, M. (2008, January 13). Hardware performance of eStream phase-III stream cipher candidates. Proceedings of the ECRYPT Workshop SASC 2008\u2013The State of the Art of Stream Ciphers, Lausanne, Switzerland."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/3\/2\/11\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:43:20Z","timestamp":1760186600000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/3\/2\/11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,6]]},"references-count":35,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2019,6]]}},"alternative-id":["cryptography3020011"],"URL":"https:\/\/doi.org\/10.3390\/cryptography3020011","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,6]]}}}