Authentication Schemes based on Physically Unclonable Functions
نویسندگان
چکیده
In this project we investigate di erent hardware authentication schemes based on Physically Unclonable Functions. We start by analyzing the concepts of a fuzzy extractor and a secure sketch from an information-theoretic perspective. We then present a hardware implementation of a fuzzy extractor which uses the code o set construction with BCH codes. Finally, we propose a new cryptographic protocol for PUF authentication based upon polynomial interpolation using Sudan's list-decoding algorithm. We provide preliminary results into the feasibility of this protocol, by looking at the practicality of nding a polynomial that can be assigned as a cryptographic key to each device.
منابع مشابه
Comparative Analysis and Framework Evaluating Mimicry-Resistant and Invisible Web Authentication Schemes
In web authentication, the many password alternatives proposed over the years, despite having different designs and objectives, all predominantly rely on an element of secrecy. This motivates us, herein, to provide the first detailed exploration of the integration of a fundamentally different element of defense into the design of web authentication schemes: a mimicry resistance dimension. We an...
متن کاملRobust Authentication in Trusted Sensing Networks with Physically Uncloneable Functions
We consider the problem of secure distributed aggregation in arbitrary networked systems. In previous work, we proposed a general approach based on the principles of trusted systems theory, in which the functionality of a generic aggregation system was secured by the application of dedicated trusted devices. Here, we propose a symmetric trusted third party authentication protocol, applicable to...
متن کاملReverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs
RFID-based tokens are increasingly used in electronic payment and ticketing systems for mutual authentication of tickets and terminals. These systems typically use cost-effective tokens without expensive hardware protection mechanisms and are exposed to hardware attacks that copy and maliciously modify tokens. Physically Unclonable Functions (PUFs) are a promising technology to protect against ...
متن کاملConverse PUF-Based Authentication
Physically Unclonable Functions (PUFs) are key tools in the construction of lightweight authentication and key exchange protocols. So far, all existing PUF-based authentication protocols follow the same paradigm: A resource-constrained prover, holding a PUF, wants to authenticate to a resource-rich verifier, who has access to a database of pre-measured PUF challenge-response pairs (CRPs). In th...
متن کاملRobust Authentication Using Physically Unclonable Functions
In this work we utilize a physically unclonable function (PUF) to improve resilience of authentication protocols to various types of compromise. As an example application, we consider users who authenticate at an ATM using their bank-issued PUF and a password. We present a scheme that is provably secure and achieves strong security properties. In particular, we ensure that (i) the user is unabl...
متن کامل