ISU
Home
ISURF/OIPTT
Home
ISURFtech
Home
Advanced
Search
RSS
Feeds
REBEL: REconfigurable Block Encryption Logic for Cyber Security
Category(s):
For Information, Contact:
Jay Bjerke
Commercialization Manager, Engineering
515-294-4740
licensing@iastate.edu
Web Published:
5/7/2015
ISURF #
3404
Summary:
Iowa State University researchers have developed a new method for ensuring the security of computer-generated transactions.

Development Stage:
Data encryption at rates in the vicinity of 128 Gigabits/second has been demonstrated, and security guarantees make the probability of a successful breach near random—many times more secure than the current AES standard.  A computer simulation is available for demonstration.

Description:
The pervasion of computer-based transactions in every day life has led to an increased need for cryptography to ensure that cyber transactions are secure.  Classical methods for encryption/decryption, such as asymmetric RSA encryption/decryption or symmetric block ciphers (for example, NIST standard AES), can take tens of millions of computing cycles that slow the speed of data encryption/decryption.  In addition, these systems also suffer from security vulnerabilities through the use of S-boxes, where public knowledge of S-box constants allows for an adversary to develop static statistical models to exploit them.  To overcome these drawbacks, ISU researchers have developed REBEL, or REconfigurable Block Encryption Logic, an alternate method for symmetric encryption/decryption which uses the secret as truth tables of a reconfigurable gate as opposed to S-boxes; these gates are deployed in a tree circuit whose security properties are extremely strong.  In addition, this technology can be implemented in underlying hardware, enabling very fast data encryption and decryption.

Advantage:
• Rapid (provides encryption and decryption at data rates 10-20 times higher than currently used methods) 
• Secure (S-boxes are not used so the system is not vulnerable to attack mediated by static statistical models)
• Versatile (can be included in hardware in embedded processors used in devices such as cell phones, smart cards (ATM cards), wireless routers, etc.)
Application:
Cyber security; Cryptography

Patent Information:
*To see the full version of the patent(s), follow the link below, then click on "Images" button.
Country Serial No. Patent No. Issued Date
United States 12/101,411 8,824,672* 9/2/2014


Direct Link: