Physical one-way functions

Modern cryptography relies on algorithmic one-way functions—numerical functions which are easy to compute but very difficult to invert. This dissertation introduces physical one-way functions and physical one-way hash functions as primitives for physical analogs of cryptosystems. Physical one-way functions are defined with respect to a physical probe and physical system in some unknown state. A function is called a physical one-way function if (a) there exists a deterministic physical interaction between the probe and the system which produces an output in constant time; (b) inverting the function using either computational or physical means is difficult; (c) simulating the physical interaction is computationally demanding and (d) the physical system is easy to make but difficult to clone. Physical one-way hash functions produce fixed-length output regardless of the size of the input. These hash functions can be obtained by sampling the output of physical one-way functions. For the system described below, it is shown that there is a strong correspondence between the properties of physical one-way hash functions and their algorithmic counterparts. In particular, it is demonstrated that they are collision-resistant and that they exhibit the avalanche effect, i.e., a small change in the physical system causes a large change in the hash value. An inexpensive prototype authentication system based on physical one-way hash functions is designed, implemented, and analyzed. The prototype uses a disordered three-dimensional microstructure as the underlying physical system and coherent radiation as the probe. It is shown that the output of the interaction between the physical system and the probe can be used to robustly derive a unique tamper-resistant identifier at a very low cost per bit. The explicit use of three-dimensional structures marks a departure from prior efforts. Two protocols, including a one-time pad protocol, that illustrate the utility of these hash functions are presented and potential attacks on the authentication system are considered. Finally, the concept of fabrication complexity is introduced as a way of quantifying the difficulty of materially cloning physical systems with arbitrary internal states. Fabrication complexity is discussed in the context of an idealized machine—a Universal Turing Machine augmented with a fabrication head—which transforms algorithmically minimal descriptions of physical systems into the systems themselves. (Copies available exclusively from MIT Libraries, Rm. 14-0551, Cambridge, MA 02139-4307. Ph. 617-253-5668; Fax 617-253-1690.)

[1]  Gabriel Cristóbal,et al.  Image Representation with Gabor Wavelets and Its Applications , 1997 .

[2]  Wolf,et al.  Weak localization and coherent backscattering of photons in disordered media. , 1985, Physical review letters.

[3]  David Hoadley,et al.  Experimental comparison of the phase-breaking lengths in weak localization and universal conductance fluctuations , 1999 .

[4]  Gustavus J. Simmons,et al.  Contemporary Cryptology: The Science of Information Integrity , 1994 .

[5]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[6]  Peter M. A. Sloot,et al.  Large Scale Simulations of Elastic Light Scattering by a Fast Discrete Dipole Approximation , 1998 .

[7]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[8]  Kogan,et al.  Random-matrix-theory approach to the intensity distributions of waves propagating in a random medium. , 1995, Physical review. B, Condensed matter.

[9]  J. Daugman Two-dimensional spectral analysis of cortical receptive field profiles , 1980, Vision Research.

[10]  Gregory J. Chaitin,et al.  On the Length of Programs for Computing Finite Binary Sequences , 1966, JACM.

[11]  Marcus,et al.  Ballistic conductance fluctuations in shape space. , 1995, Physical review letters.

[12]  Feng,et al.  Correlations and fluctuations of coherent wave transmission through disordered media. , 1988, Physical review letters.

[13]  H. V. Hulst Light Scattering by Small Particles , 1957 .

[14]  M. V. Rossum,et al.  Multiple scattering of classical waves: microscopy, mesoscopy, and diffusion , 1998, cond-mat/9804141.

[15]  A. Kolmogorov Three approaches to the quantitative definition of information , 1968 .

[16]  Larry J. Hornbeck,et al.  Deformable-Mirror Spatial Light Modulators , 1990, Optics & Photonics.

[17]  SHECHAO FENG,et al.  Mesoscopic Conductors and Correlations in Laser Speckle Patterns , 1991, Science.

[18]  E. Swanson,et al.  Optical Coherence Tomography , 1992, LEOS '92 Conference Proceedings.

[19]  Charles H. Bennett,et al.  The thermodynamics of computation—a review , 1982 .

[20]  Thomas Kailath Multivariable Control, Simulation, Optimization, and Signal Processing for the Microlithographic Process , 2001 .

[21]  Mihir Bellare,et al.  A Note on Negligible Functions , 2002, Journal of Cryptology.

[22]  N. F. de Rooij,et al.  Silicon micromechanics for the fiber-optic information highway , 1998 .

[23]  Edward H. Adelson,et al.  IMAGE DATA COMPRESSION WITH THE LAPLACIAN PYRAMID , 1981 .

[24]  Silvio Micali,et al.  Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing , 1996, CRYPTO.

[25]  Stéphane Mallat,et al.  A Theory for Multiresolution Signal Decomposition: The Wavelet Representation , 1989, IEEE Trans. Pattern Anal. Mach. Intell..

[26]  Maynard,et al.  Instabilities of waves in nonlinear disordered media , 2000, Physical review letters.

[27]  Claude E. Shannon,et al.  The Mathematical Theory of Communication , 1950 .

[28]  Ray J. Solomonoff,et al.  A Formal Theory of Inductive Inference. Part II , 1964, Inf. Control..

[29]  D J Heeger,et al.  Model for the extraction of image flow. , 1987, Journal of the Optical Society of America. A, Optics and image science.

[30]  J. Fujimoto,et al.  Optical Coherence Tomography , 1991, LEOS '92 Conference Proceedings.

[31]  Adam Shostack,et al.  Breaking Up Is Hard To Do: Modeling Security Threats for Smart Cards , 1999, Smartcard.

[32]  J W Goodman,et al.  Holographic reciprocity law failure. , 1984, Applied optics.

[33]  Stephen Wiesner,et al.  Conjugate coding , 1983, SIGA.

[34]  Berkovits Sensitivity of the multiple-scattering speckle pattern to the motion of a single scatterer. , 1991, Physical review. B, Condensed matter.

[35]  Spivak,et al.  Mesoscopic sensitivity of speckles in disordered nonlinear media to changes of the scattering potential , 2000, Physical review letters.

[36]  Gabriel Cristóbal,et al.  Space and frequency variant image enhancement based on a Gabor representation , 1994, Pattern Recognit. Lett..

[37]  W. Wootters,et al.  A single quantum cannot be cloned , 1982, Nature.

[38]  S Kirkpatrick,et al.  Critical Behavior in the Satisfiability of Random Boolean Expressions , 1994, Science.

[39]  Maurice V. Wilkes,et al.  Time-sharing computer systems , 1968 .

[40]  P. Anderson Absence of Diffusion in Certain Random Lattices , 1958 .

[41]  Philip W. Anderson,et al.  The question of classical localization A theory of white paint , 1985 .

[42]  Bruce Schneier,et al.  An authenticated camera , 1996, Proceedings 12th Annual Computer Security Applications Conference.

[43]  John Rompel,et al.  One-way functions are necessary and sufficient for secure signatures , 1990, STOC '90.

[44]  Leonid A. Levin,et al.  A Pseudorandom Generator from any One-way Function , 1999, SIAM J. Comput..

[45]  Claude E. Shannon,et al.  A mathematical theory of communication , 1948, MOCO.

[46]  John G. Daugman,et al.  Complete discrete 2-D Gabor transforms by neural networks for image analysis and compression , 1988, IEEE Trans. Acoust. Speech Signal Process..

[47]  J. Fujimoto,et al.  Optical Coherence Tomography , 1991 .

[48]  Dennis Gabor,et al.  Theory of communication , 1946 .

[50]  A. Lagendijk,et al.  Observation of weak localization of light in a random medium. , 1985, Physical review letters.

[51]  Van Renesse,et al.  Optical document security , 1994 .

[52]  J. Daugman Uncertainty relation for resolution in space, spatial frequency, and orientation optimized by two-dimensional visual cortical filters. , 1985, Journal of the Optical Society of America. A, Optics and image science.

[53]  Thomas K. Gaylord,et al.  Ballistic electron transport in semiconductor heterostructures and its analogies in electromagnetic propagation in general dielectrics , 1991, Proc. IEEE.

[54]  Ueli Maurer,et al.  Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.

[55]  Ronald L. Rivest,et al.  Introduction to Algorithms , 1990 .

[56]  Gilles Brassard,et al.  Quantum Cryptography, or Unforgeable Subway Tokens , 1982, CRYPTO.

[57]  Alexander H. Slocum,et al.  Design of three-groove kinematic couplings , 1992 .

[58]  Oscar Nestares,et al.  Efficient spatial-domain implementation of a multiscale image representation based on Gabor functions , 1998, J. Electronic Imaging.

[59]  Charles F. Hockett,et al.  A mathematical theory of communication , 1948, MOCO.

[60]  S. Datta Electronic transport in mesoscopic systems , 1995 .

[61]  J. Goodman Statistical Optics , 1985 .

[62]  Leo Marks Between Silk and Cyanide: A Codemaker's War, 1941-1945 , 1998 .

[63]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[64]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[65]  Feng,et al.  Memory effects in propagation of optical waves through disordered media. , 1988, Physical review letters.

[66]  Oded Goldreich,et al.  Modern Cryptography, Probabilistic Proofs and Pseudorandomness , 1998, Algorithms and Combinatorics.

[67]  A. Turing On Computable Numbers, with an Application to the Entscheidungsproblem. , 1937 .

[68]  R. Howard,et al.  Electrons in Silicon Microstructures , 1986, Science.

[69]  J. Daugman Spatial visual channels in the fourier plane , 1984, Vision Research.