• Speaker : Marten van Dijk
  • Location : ITE 401
  • Date : March 26th, 2018
  • Time : 1:00 - 2:00 PM

Abstract

Given the value of imported counterfeit and pirated goods, the need for secure supply chain management is pertinent. Maleki et al.(HOST 2017) propose a new management scheme based on RFID tags (with 2-3K bits NVM) which, if compared to other schemes, is competitive on several performance and security metrics. Its main idea is to have each RFID tag stores its reader events in its own NVM while moving through the supply chain. In order to bind a tag’s identity to each event such that an adversary is not able to impersonate the tag’s identity on another duplicate tag, a function with a weak form of unforgeability is needed. In this paper, we formally define this security property, present three constructions (MULTIPLY-ADD, ADD-XOR, and S-Box-CBC) having this security property, and show how to bound the probability of successful impersonation in concrete parameter settings. Finally, we compare our constructions with the light-weight hash function PHOTON used by Maleki et al. in terms of security and circuit area needed. We conclude that our ADD-XOR and S-Box-CBC constructions have approximately 14 - 13 of PHOTON’s total circuit area (this also includes the control circuitry besides PHOTON) while maintaining an appropriate security level which takes care of economically motivated adversaries

Bio

Marten has 15+ years research experience in system security both in academia and industry: He is now the Charles H. Knapp Associate Professor in the ECE Department at UConn. He worked for two and a half years at RSA Laboratories in cybersecurity. Prior to RSA he was a research scientist at MIT CSAIL working together with Prof. Srini Devadas with an emphasis on processor architectures that offer strong security guarantees; most notably, this collaboration led to the introduction of the first circuit realizations of Physical Unclonable Functions (PUFs) which received the A. Richard Newton Technical Impact Award in Electronic Design Automation in 2015 (and the ACSAC’02 outstanding student paper award), led to the design of Aegis, the first single-chip secure processor that verifies integrity and freshness of external memory which was selected for inclusion in ”25 years of International Conference on Supercomputing” in 2014, and led to a simple and efficient Oblivious RAM which received a best student paper award at CCS 2013. The IRIS authenticated file system with proofs of retrievability received the NYU-Poly AT&T Best Applied Security Paper Award, 3rd place, 2012. His work on fully homomorphic encryption over the integers was nominated (1 out of 3) for best paper award at Eurocrypt 2010. Prior to working in system security he was a research scientist at the digital signal processing group at Philips Research where he became the lead inventor of the error correcting codes used in Blu-ray disc. He received a Ph.D. in mathematics, a M.S. in mathematics, and a M.S. in computer science from Eindhoven University of Technology.