{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:53:28Z","timestamp":1760241208936,"version":"build-2065373602"},"reference-count":45,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2019,12,17]],"date-time":"2019-12-17T00:00:00Z","timestamp":1576540800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001655","name":"Deutscher Akademischer Austauschdienst","doi-asserted-by":"publisher","award":["57214224"],"award-info":[{"award-number":["57214224"]}],"id":[{"id":"10.13039\/501100001655","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>The Secret Unknown Cipher (SUC) concept was introduced a decade ago as a promising technique for creating pure digital clone-resistant electronic units as alternatives to the traditional non-consistent Physical Unclonable Functions (PUFs). In this work, a very special unconventional cipher design is presented. The design uses hard-core FPGA (Field Programmable Gate Arrays) -Mathblocks available in modern system-on-chip (SoC) FPGAs. Such Mathblocks are often not completely used in many FPGA applications; therefore, it seems wise to make use of such dead (unused) modules to fabricate usable physical security functions for free. Standard cipher designs usually avoid deploying multipliers in the cipher mapping functions due to their high complexity. The main target of this work is to design large cipher classes (e.g., cipher class size &gt;2600) by mainly deploying the FPGA specific mathematical cores. The proposed cipher designs are novel hardware-oriented and new in the public literature, using fully new unusual mapping functions. If a random unknown selection of one cipher out of 2600 ciphers is self-configured in a device, then a Secret Unknown Cipher module is created within a device, making it physically hard to clone. We consider the cipher module for free (for zero cost) if the major elements in the cipher module are making use of unused reanimated Mathblocks. Such ciphers are usable in many future mass products for protecting vehicular units against cloning and modeling attacks. The required self-reconfigurable devices for that concept are not available now; however, they are expected to emerge in the near future.<\/jats:p>","DOI":"10.3390\/cryptography3040028","type":"journal-article","created":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T03:19:36Z","timestamp":1576811976000},"page":"28","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["New Mathblocks-Based Feistel-Like Ciphers for Creating Clone-Resistant FPGA Devices"],"prefix":"10.3390","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7380-5270","authenticated-orcid":false,"given":"Saleh","family":"Mulhem","sequence":"first","affiliation":[{"name":"Institute of Computer and Network Engineering, Technical University of Braunschweig, 38106 Braunschweig, Germany"}]},{"given":"Wael","family":"Adi","sequence":"additional","affiliation":[{"name":"Institute of Computer and Network Engineering, Technical University of Braunschweig, 38106 Braunschweig, Germany"}]}],"member":"1968","published-online":{"date-parts":[[2019,12,17]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1537","DOI":"10.1109\/TPDS.2015.2442980","article-title":"A Survey of Software Techniques for Using Non-Volatile Memories for Storage and Main Memory Systems","volume":"27","author":"Mittal","year":"2016","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_2","unstructured":"Skorobogatov, S. (2005). Semi-Invasive Attacks: A New Approach to Hardware Security Analysis, University of Cambridge."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Maes, R., and Verbauwhede, I. (2010). Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions. Towards Hardware-Intrinsic Security, Springer.","DOI":"10.1007\/978-3-642-14452-3_1"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2818186","article-title":"A Survey on Lightweight Entity Authentication with Strong PUFs","volume":"48","author":"Delvaux","year":"2015","journal-title":"ACM Comput. Surv."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., Sehnke, F., S\u00f6lter, J., Dror, G., Devadas, S., and Schmidhuber, J. (2010, January 4\u20138). Modeling attacks on physical unclonable functions. Proceedings of the 17th ACM conference on Computer and communications security-CCS\u201910, Chicago, IL, USA.","DOI":"10.1145\/1866307.1866335"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1137\/060651380","article-title":"Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data","volume":"38","author":"Dodis","year":"2008","journal-title":"SIAM J. Comput."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"889","DOI":"10.1109\/TCAD.2014.2370531","article-title":"Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis","volume":"34","author":"Delvaux","year":"2015","journal-title":"IEEE Trans. Comput. Des. Integr. Circuits Syst."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.-J., and Tuyls, P. (2007). FPGA Intrinsic PUFs and Their Use for IP Protection. Cryptographic Hardware and Embedded Systems-CHES 2007, Springer.","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"2026","DOI":"10.1126\/science.1074376","article-title":"Physical One-Way Functions","volume":"297","author":"Pappu","year":"2002","journal-title":"Science"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., van Dijk, M., and Devadas, S. (2002, January 9\u201313). Controlled physical random functions. Proceedings of the 18th Annual Computer Security Applications Conference, Las Vegas, NV, USA.","DOI":"10.1145\/586110.586132"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Adi, W. (2009, January 20\u201321). Autonomous Physical Secret Functions and Clone-Resistant Identification. Proceedings of the 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security, Edingburgh, UK.","DOI":"10.1109\/BLISS.2009.16"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Mulhem, S., Mars, A., and Adi, W. (2019). A Cipher Class Based on Golden S-Boxes for Creating Clone-Resistant Identities. International Workshop on Information and Operational Technology Security Systems, Springer.","DOI":"10.1007\/978-3-030-12085-6_1"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Mulhem, S., Mohammad, M., and Adi, W. (2019, January 20\u201324). A New Low-Complexity Cipher Class for Clone-Resistant Identities. Proceedings of the 2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia.","DOI":"10.23919\/MIPRO.2019.8756787"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Mulhem, S., Ayache, M., and Adi, W. (2019, January 22\u201324). Mini-Block-Based Cipher Class for Physical Clone-Resistant Devices. Proceedings of the EST-Eighth IEEE International Conference on Emerging Security Technologies, Colchester, UK.","DOI":"10.1109\/EST.2019.8806216"},{"key":"ref_15","unstructured":"Sadeghi, A., Visconti, I., and Wachsmann, C. (2010, January 22\u201323). PUF-enhanced RFID security and privacy. Proceedings of the 2nd Workshop on Secure Component and System Identification (SECSI 2010), Cologne, Germany."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1007\/978-3-642-10366-7_40","article-title":"Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions","volume":"Volume 5912","author":"Armknecht","year":"2009","journal-title":"Proceedings of the Advances in Cryptology\u2013ASIACRYPT 2009"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Goldreich, O. (2003). Foundations of Cryptography, Cambridge University Press.","DOI":"10.1017\/CBO9780511721656"},{"key":"ref_18","first-page":"277","article-title":"On the Foundations of Physical Unclonable Functions","volume":"2009","author":"Sehnke","year":"2009","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref_19","first-page":"171","article-title":"On Foundation and Construction of Physical Unclonable Functions","volume":"2010","author":"Wu","year":"2010","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1805","DOI":"10.1007\/s10701-005-7350-7","article-title":"How does the Entropy\/Information Bound Work?","volume":"35","author":"Bekenstein","year":"2005","journal-title":"Found. Phys."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Prouff, E., and Schaumont, P. (2012). PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator. International Workshop on Cryptographic Hardware and Embedded Systems, Springer.","DOI":"10.1007\/978-3-642-33027-8"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Adi, W., Ouertani, N., Hanoun, A., and Soudan, B. (2009, January 5\u20138). Deploying FPGA self-configurable cell structure for micro crypto-functions. Proceedings of the 2009 IEEE Symposium on Computers and Communications, Sousse, Tunisia.","DOI":"10.1109\/ISCC.2009.5202368"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Adi, W., and Soudan, B. (2007, January 9\u201310). Bio-Inspired Electronic-Mutation with genetic properties for Secured Identification. Proceedings of the 2007 ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for Security (BLISS 2007), Edinburgh, UK.","DOI":"10.1109\/BLISS.2007.31"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Lindell, Y. (2017). Pseudorandom Functions: Three Decades Later. Tutorials on the Foundations of Cryptography. Information Security and Cryptography, Springer.","DOI":"10.1007\/978-3-319-57048-8"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Rivest, R.L. (1993). Cryptography and machine learning. International Conference on the Theory and Application of Cryptology, Springer.","DOI":"10.1007\/3-540-57332-1_36"},{"key":"ref_26","unstructured":"(2019, September 08). SmartFusion2 SoC FPGAs|Microsemi. Available online: https:\/\/www.microsemi.com\/product-directory\/soc-fpgas\/1692-smartfusion2."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"534","DOI":"10.1145\/1015047.1015052","article-title":"Security on FPGAs","volume":"3","author":"Wollinger","year":"2004","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/s13389-017-0160-y","article-title":"A review of lightweight block ciphers","volume":"8","author":"Hatzivasilis","year":"2018","journal-title":"J. Cryptogr. Eng."},{"key":"ref_29","unstructured":"National Bureau of Standards (1977). FIPS Publication 46: Data Encryption Standard (DES)."},{"key":"ref_30","first-page":"39","article-title":"Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms\u2014Design andAnalysis","volume":"Volume 2012","author":"Stinson","year":"2001","journal-title":"Proceedings of the SAC 2000"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1007\/978-3-642-21554-4_19","article-title":"LBlock: A Lightweight Block Cipher","volume":"Volume 6715","author":"Tsudik","year":"2011","journal-title":"Proceedings of the Applied Cryptography and Network Security. ACNS 2011"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Biham, E., and Shamir, A. (1993). Differential Cryptanalysis of the Data Encryption Standard, Springer.","DOI":"10.1007\/978-1-4613-9314-6"},{"key":"ref_33","unstructured":"Patel, S., Ramzan, Z., and Sundaram, G.S. (2002, January 15\u201316). Luby-Rackoff Ciphers over Finite Algebraic Structures or Why XOR is not so Exclusive. Proceedings of the Selected Areas in Cryptography-SAC 2002, St. John\u2019s, NL, Canada. LNCS 2595."},{"key":"ref_34","first-page":"271","article-title":"Luby-Racko. Ciphers: Why XOR Is Not So Exclusive","volume":"Volume 2595","author":"Nyberg","year":"2003","journal-title":"Proceedings of the Selected Areas in Cryptography. SAC 2002"},{"key":"ref_35","unstructured":"Carter, G., Dawson, E., and Nielsen, L. (1995, January 18\u201319). DESV: A Latin Square variation of DES. Proceedings of the Workshop on Selected Areas of Cryptography, Carleton University, Ottawa, ON, Canada."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Klimov, A., and Shamir, A. (2003). A New Class of Invertible Mappings. International Workshop on Cryptographic Hardware and Embedded Systems, Springer.","DOI":"10.1007\/3-540-36400-5_34"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1006\/ffta.2000.0282","article-title":"Permutation Polynomials Modulo 2w","volume":"7","author":"Rivest","year":"2001","journal-title":"Finite Fields Their Appl."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1007\/3-540-45682-1_14","article-title":"Generic Attacks on Feistel Schemes","volume":"Volume 2248","author":"Boyd","year":"2001","journal-title":"Proceedings of the Advances in Cryptology\u2014ASIACRYPT 2001"},{"key":"ref_39","unstructured":"Boneh, D., and Shoup, V. (2017). A Graduate Course in Applied Cryptography, Stanford University. Version 0.4."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1007\/978-3-642-28496-0_7","article-title":"Cryptographic Analysis of All 4 \u00d7 4-Bit S-Boxes","volume":"Volume 7118","author":"Saarinen","year":"2012","journal-title":"Proceedings of the Selected Areas in Cryptography (SAC 2011)"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Daemen, J., and Rijmen, V. (2002). The Design of Rijndael: AES-The Advanced Encryption Standard, Springer.","DOI":"10.1007\/978-3-662-04722-4_1"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/978-3-540-85893-5_7","article-title":"Ultra-Lightweight Implementations for Smart Devices\u2013Security for 1000 Gate Equivalents","volume":"Volume 5189","author":"Grimaud","year":"2008","journal-title":"Proceedings of the mart Card Research and Advanced Applications (CARDIS 2008)"},{"key":"ref_43","unstructured":"Borghoff, J. (2011). Cryptanalysis of Lightweight Ciphers, Technical University of Denmark (DTU)."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1007\/s10623-016-0217-4","article-title":"A new counting method to bound the number of active S-boxes in Rijndael and 3D","volume":"83","author":"Sajadieh","year":"2017","journal-title":"Des. Codes Cryptogr."},{"key":"ref_45","unstructured":"Maurer, U.M. (1992, January 24\u201328). A Simplified and Generalized Treatment of Luby-Rackoff Pseudorandom Permutation Generators. Proceedings of the Advances in Cryptology\u2014EUROCRYPT\u2019 1992, Balatonf\u00fcred, Hungary."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/3\/4\/28\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:42:53Z","timestamp":1760190173000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/3\/4\/28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,17]]},"references-count":45,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2019,12]]}},"alternative-id":["cryptography3040028"],"URL":"https:\/\/doi.org\/10.3390\/cryptography3040028","relation":{},"ISSN":["2410-387X"],"issn-type":[{"type":"electronic","value":"2410-387X"}],"subject":[],"published":{"date-parts":[[2019,12,17]]}}}