Quantum-secure Authentication of a Physical Unclonable Key

نویسندگان

  • SEBASTIANUS A. GOORDEN
  • MARCEL HORSTMANN
  • ALLARD P. MOSK
  • BORIS ŠKORIĆ
  • PEPIJN W.H. PINKSE
چکیده

UNCLONABLE KEY SEBASTIANUS A. GOORDEN, MARCEL HORSTMANN, ALLARD P. MOSK, BORIS ŠKORIĆ, AND PEPIJN W.H. PINKSE Complex Photonic Systems (COPS), MESA+ Institute for Nanotechnology, University of Twente, PO Box 217, 7500 AE Enschede, The Netherlands Laser Physics and Nonlinear Optics (LPNO), MESA+ Institute for Nanotechnology, University of Twente, PO Box 217, 7500 AE Enschede, The Netherlands Eindhoven University of Technology, PO Box 513, 5600 MB Eindhoven, The Netherlands *Corresponding author: [email protected]

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Unconditionally secure credit/debit card chip scheme and physical unclonable function

The statistical-physics-based Kirchhoff-law–Johnson-noise (KLJN) key exchange offers a new and simple unclonable system for credit/debit card chip authentication and payment. The key exchange, the authentication and the communication are unconditionally secure so that neither mathematicsnor statistics-based attacks are able to crack the scheme. The ohmic connection and the short wiring lengths ...

متن کامل

Physical Unclonable Function Hardware Keys Utilizing Kirchhoff-law-johnson-noise Secure Key Exchange and Noise-based Logic

Weak unclonable function (PUF) encryption key means that the manufacturer of the hardware can clone the key but not anybody else. Strong unclonable function (PUF) encryption key means that even the manufacturer of the hardware is unable to clone the key. In this paper, first we introduce an “ultra” strong PUF with intrinsic dynamical randomness, which is not only unclonable but also gets renewe...

متن کامل

Barrel Shifter Physical Unclonable Function Based Encryption

Physical Unclonable Functions (PUFs) are circuits designed to extract physical randomness from the underlying circuit. This randomness depends on the manufacturing process. It differs for each device enabling chip-level authentication and key generation [1] applications. We present a protocol utilizing a PUF for secure data transmission. Parties each have a PUF used for encryption and decryptio...

متن کامل

PUF-based solutions for secure communications in Advanced Metering Infrastructure (AMI)

In this paper, by considering the constraints of Advanced Metering Infrastructure (AMI) systems, we propose an authenticated key exchange protocol and an authenticated message broadcasting protocol. The proposed protocols are based on two well-known protocols, Okamoto and Schnorr, and inherit their security features. For providing the security of the system against physical attacks, we utilize ...

متن کامل

Run-Time Accessible DRAM PUFs in Commodity Devices

A Physically Unclonable Function (PUF) is a unique and stable physical characteristic of a piece of hardware, which emerges due to variations in the fabrication processes. Prior works have demonstrated that PUFs are a promising cryptographic primitive to enable secure key storage, hardware-based device authentication and identification. So far, most PUF constructions require addition of new har...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014