INS - Ingénierie Numérique et Sécurité

Control theory for synchronization in private communications – THE CASCADE

Control theory for synchronization issues in private communications

Synchronization is not only an ubiquitous phenomenon in natural world, but can also be an interesting <br />solution for different problems encountered in engineering area. In particular, it turns out <br />that synchronization between coupled entities in a unidirectional way, that is in a master-slave <br />configuration, is a mechanism used in private communication, more precisely in cryptographic <br />setups involving ciphers called self-synchronizing stream ciphers.

Towards new classes of self-synchronizing stream ciphers

The aim of the project THE CASCADE is to propose new architectures of Self Synchronizing <br />Stream Ciphers. An SSSC-based private and secure communication can be modelled as a masterslave <br />configuration involving dynamical systems. However, not all dynamical systems are proper <br />ones. In order for a dynamical system to be a good candidate to serve as an SSSC, the resulting <br />master-slave setup must match three major conditions <br />a) it must get the self-synchronization property <br />b) it must agree with cryptographic purposes in particular the security criteria <br />c) it must be viable in a real-world situation <br />So, the challenge is threefold.

The specificity and the originality of the project is the combination of modern tools from
control theory and timely cryptographic purposes. Indeed, synchronization can be interpreted as a state reconstruction problem while
the recovery of the information at the receiver side can be viewed as a left inversion problem.

Synchronization
- Result 1: synchronization by LPV approaches
- faltaness characterization by graph-theoretical approaches

Securiy
- Proof of the IND-CPA security of the canonical form of self-syncjronizing stream ciphers

Synchronization
- From result 1, a systematic approach for constructing an SSSC will be derived.

Securiy
- Statistical analysis of the security and algebraic attacks

Journal papers

[1a] B. DRAVIE, J.PARRIAUX, P. GUILLOT and G. MILLERIOUX, 2015, Matrix representations of vectorial Boolean functions and eigenanalysis. In Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences. <b

Synchronization is not only an ubiquitous phenomenon in natural world, but can also be an interesting solution for different problems encountered in engineering area. In particular, it turns out that synchronization between coupled entities in a unidirectional way, that is in a master-slave configuration, is a mechanism used in private communication, more precisely in cryptographic setups involving ciphers called self-synchronizing stream ciphers. The main principle of such ciphers is based on generators delivering complex sequences used to conceal information. Those generators must be synchronized at the transmitter (ciphering) and receiver (deciphering) sides for proper information recovery. The aim of the project THE CASCADE is to propose new self-synchronizing architectures for private communications. On the upgrowing field of group communications, self-synchronization is a key feature for high speed communications like PMR (Professional Mobile Radio) systems and for a lot of new devices which are small, mobile, at low consumption and low cost such as some Bluetooth equipments, RFID tags, sensors that require lightweight cryptography, survivable Cyber-Physical Systems.

The specificity and the originality of the project is the combination of modern tools from control theory and timely cryptographic purposes. More precisely, the use of dynamical systems and modern control theoretical concepts will allow to provide and suggest new self-synchronizing architectures.

Clearly, even though control theory is central for the purpose of the project, issues related to security assessment and implementation will also be deeply examined. Hence, investigations for provable security will be carried out and resistance to distinct attacks will be assessed: algebraic attacks addressed as aparameter identifiability problem, distinguisher-based attacks, side channel attacks. Some of the attacks will be particularized owing to the specificity of the generators which will be proposed. A real-world communication platform for tests and validation will be designed by the companies involved in the project.

Project coordinator

Centre de Recherche en Automatique de Nancy (Laboratoire public)

The author of this summary is the project coordinator, who is responsible for the content of this summary. The ANR declines any responsibility as for its contents.

Partner

Cassidian CyberSecurity SAS
Laboratoire d'Informatique Avancée de Saint-Denis
Laboratoire Analyse, Géométrie et Applications
Centre de Recherche en Automatique de Nancy

Help of the ANR 319,896 euros
Beginning and duration of the scientific project: March 2014 - 42 Months

Useful links