Secret-free security: a survey and tutorial

نویسندگان

چکیده

Abstract “Classical keys,” i.e., secret keys stored permanently in digital form nonvolatile memory, appear indispensable modern computer security—but also constitute an obvious attack target any hardware containing them. This contradiction has led to perpetual battle between key extractors and protectors over the decades. It is long known that physical unclonable functions (PUFs) can at least partially overcome this issue, since they enable secure without above classical keys. Unfortunately, recent research revealed many standard PUFs still contain other types of “secrets” deeper their structure, whose disclosure adversaries breaks security as well: Examples include manufacturing variations SRAM PUFs, power-up states or signal delays Arbiter PUFs. Most these secrets have already been extracted viable attacks past, breaking PUF-security practice. A second generation primitives now shows potential resolve remaining problem, however. In certain applications, so-called Complex SIMPLs/PPUFs, UNOs are able realize not just free sense, but completely “secret-free” instead. resulting systems, could hypothetically be allowed inspect every bit atom, learn information present system, being break security. Secret-free would hence promise innately immune against malware-based key-extraction: There simply no security–critical extract anymore. Our survey tutorial paper takes described situation starting point, categorizes, formalizes, overviews recently evolving area secret-free . We propose attempt making promising endeavor future designs, those application scenarios where logically possible. others, we suggest techniques combined with methods construct hybrid systems notably reduced surfaces.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SDN Security: A Survey

The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...

متن کامل

SDN Security: A Survey

The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...

متن کامل

Security Analysis of a Hash-Based Secret Sharing Scheme

Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...

متن کامل

On the design and security of a lattice-based threshold secret sharing scheme

In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...

متن کامل

Secret-Sharing Schemes: A Survey

A secret-sharing scheme is a method by which a dealer distributes shares to parties such that only authorized subsets of parties can reconstruct the secret. Secret-sharing schemes are important tools in cryptography and they are used as a building box in many secure protocols, e.g., general protocol for multiparty computation, Byzantine agreement, threshold cryptography, access control, attribu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Cryptographic Engineering

سال: 2022

ISSN: ['2190-8508', '2190-8516']

DOI: https://doi.org/10.1007/s13389-021-00283-6