Unconditionally secure credit/debit card chip scheme and physical unclonable function

نویسندگان

  • Laszlo B. Kish
  • Kamran Entesari
  • Claes-Goran Granqvist
  • Chiman Kwan
چکیده

The statistical-physics-based Kirchhoff-law–Johnson-noise (KLJN) key exchange offers a new and simple unclonable system for credit/debit card chip authentication and payment. The key exchange, the authentication and the communication are unconditionally secure so that neither mathematicsnor statistics-based attacks are able to crack the scheme. The ohmic connection and the short wiring lengths between the chips in the card and the terminal constitute an ideal setting for the KLJN protocol, and even its simplest versions offer unprecedented security and privacy for credit/debit card chips and applications of physical unclonable functions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Physical Unclonable Function Hardware Keys Utilizing Kirchhoff-law-johnson-noise Secure Key Exchange and Noise-based Logic

Weak unclonable function (PUF) encryption key means that the manufacturer of the hardware can clone the key but not anybody else. Strong unclonable function (PUF) encryption key means that even the manufacturer of the hardware is unable to clone the key. In this paper, first we introduce an “ultra” strong PUF with intrinsic dynamical randomness, which is not only unclonable but also gets renewe...

متن کامل

P ricing in debit and credit card schemes * Julian Wright

This paper presents a model of a debit or credit card payment scheme, providing a simple determination of the socially optimal structure of fees between those charged to cardholders and those charged to merchants.  2003 Elsevier B.V. All rights reserved.

متن کامل

Advances in Smartcard Security

Hardware architecture Smartcards come in different shapes. First of all there is a distinction between contact cards and contact-less cards. The first kind is easily recognised by the characteristic contact stamp that appears on both credit-card sized and SIM card sized versions. The second one is more difficult to identify because the chip may be hidden not only inside a credit-card sized cont...

متن کامل

Requirements for Network Payment: The NetCheque Perspective

Secure methods of payment are needed before we will see widespread commercial use of the Internet. Recently proposed and implemented payment methods follow one of three models: electronic currency, credit-debit, and secure credit card transactions. Such payment services have diierent strengths and weaknesses with respect to the requirements of of security, reliability , scalability, anonymity, ...

متن کامل

Improving e-payment security using Elliptic Curve Cryptosystem

The use of e-commerce has been associated with a lot of skepticism and apprehension due to some crimes associated with e-commerce and specifically to payment systems. The secure socket layer (SSL) protocol is trusted in this regard to secure transactions for sensitive applications like e-commerce. Unfortunately, the use of SSL protocol causes slow response time on the server which is a major ca...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1605.02355  شماره 

صفحات  -

تاریخ انتشار 2016