Secret-free security: a survey and tutorial
نویسندگان
چکیده
Abstract “Classical keys,” i.e., secret keys stored permanently in digital form nonvolatile memory, appear indispensable modern computer security—but also constitute an obvious attack target any hardware containing them. This contradiction has led to perpetual battle between key extractors and protectors over the decades. It is long known that physical unclonable functions (PUFs) can at least partially overcome this issue, since they enable secure without above classical keys. Unfortunately, recent research revealed many standard PUFs still contain other types of “secrets” deeper their structure, whose disclosure adversaries breaks security as well: Examples include manufacturing variations SRAM PUFs, power-up states or signal delays Arbiter PUFs. Most these secrets have already been extracted viable attacks past, breaking PUF-security practice. A second generation primitives now shows potential resolve remaining problem, however. In certain applications, so-called Complex SIMPLs/PPUFs, UNOs are able realize not just free sense, but completely “secret-free” instead. resulting systems, could hypothetically be allowed inspect every bit atom, learn information present system, being break security. Secret-free would hence promise innately immune against malware-based key-extraction: There simply no security–critical extract anymore. Our survey tutorial paper takes described situation starting point, categorizes, formalizes, overviews recently evolving area secret-free . We propose attempt making promising endeavor future designs, those application scenarios where logically possible. others, we suggest techniques combined with methods construct hybrid systems notably reduced surfaces.
منابع مشابه
SDN Security: A Survey
The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...
متن کاملSDN Security: A Survey
The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...
متن کاملSecurity Analysis of a Hash-Based Secret Sharing Scheme
Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...
متن کاملOn the design and security of a lattice-based threshold secret sharing scheme
In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...
متن کاملSecret-Sharing Schemes: A Survey
A secret-sharing scheme is a method by which a dealer distributes shares to parties such that only authorized subsets of parties can reconstruct the secret. Secret-sharing schemes are important tools in cryptography and they are used as a building box in many secure protocols, e.g., general protocol for multiparty computation, Byzantine agreement, threshold cryptography, access control, attribu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Cryptographic Engineering
سال: 2022
ISSN: ['2190-8508', '2190-8516']
DOI: https://doi.org/10.1007/s13389-021-00283-6