Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions
نویسندگان
چکیده
Lattice and code cryptography can replace existing schemes such as elliptic curve because of their resistance to quantum computers. In support public key infrastructures, the distribution, validation storage cryptographic keys is then more complex for handling longer keys. This paper describes practical ways generate from physical unclonable functions, both lattice code-based cryptography. Handshakes between client devices containing functions (PUFs) a server are used select sets addressable positions in PUFs, which streams bits called seeds generated on demand. The private pairs computed these together with additional random numbers. method allows independently validate by PUF, act certificate authority network. Technologies high performance computing, graphic processing units further enhance security preventing attackers making this independent when only equipped less powerful
منابع مشابه
Continuous-variable quantum authentication of physical unclonable keys
We propose a scheme for authentication of physical keys that are materialized by optical multiple-scattering media. The authentication relies on the optical response of the key when probed by randomly selected coherent states of light, and the use of standard wavefront-shaping techniques that direct the scattered photons coherently to a specific target mode at the output. The quadratures of the...
متن کامل6.2 Physical Unclonable Functions
11:00 6.2.1 EFFICIENT ATTACKS ON ROBUST RING OSCILLATOR PUF WITH ENHANCED CHALLENGE-RESPONSE SET (Paper/SoftConf ID: 699) Speakers: Phuong Ha Nguyen, Durga Prasad Sahoo, Rajat Subhra Chakraborty and Debdeep Mukhopadhyay, Indian Institute of Technology Kharagpur, IN Abstract Physically Unclonable Function (PUF) circuits are an important class of hardware security primitives that promise a paradi...
متن کاملPUF – Physical Unclonable Functions
from historical banking and telecommunication applications to electronic passports, electronic IDs, anti-counterfeiting devices, smartgrid applications, and more. The security requirements for most of these applications are crucial and evolving. In addition, more and more sophisticated attacks are being developed every day. As a result, design of Smart Card ICs is a growing challenge. This pape...
متن کاملKey Derivation with Physical Unclonable Functions
Secure cryptographic keys are a prerequisite to protect the data that is transmitted and stored by today’s and tomorrows embedded systems in the Internet of Things. For many of those systems, secure Non-Volatile Memory (NVM) is not available due to technical and cost constraints. Silicon Physical Unclonable Functions (PUFs) evaluate manufacturing variations to generate unique secrets inside Int...
متن کاملRevisiting Optical Physical Unclonable Functions
We revisit optical physical unclonable functions (PUFs), which were introduced by Pappu et al. [36, 37] in their seminal and historically first publication on PUFs. We start our studies with non-integrated PUFs. We discuss their resilience against machine learning attacks, and systematically study the influence of using more than one laser beam, varied laser diameters, and smaller scatterer siz...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied sciences
سال: 2021
ISSN: ['2076-3417']
DOI: https://doi.org/10.3390/app11062801