TREVERSE: TRial-and-Error Lightweight Secure ReVERSE Authentication With Simulatable PUFs
نویسندگان
چکیده
A physical unclonable function (PUF) generates hardware intrinsic volatile secrets by exploiting uncontrollable manufacturing randomness. Although PUFs provide the potential for lightweight and secure authentication increasing numbers of low-end Internet Things devices, practical mechanisms remain elusive. We aim to explore simulatable (SimPUFs) that are physically but efficiently modeled mathematically through privileged one-time PUF access address above problem. Given a challenge, securely stored SimPUF in possession trusted server computes corresponding response its bit-specific reliability. Consequently, naturally noisy responses generated resource limited prover can be immediately processed one-way (OWF) transmitted server, because resourceful exploit perform trial-and-error search over likely error patterns recover authenticate prover. Security reverse (TREVERSE) under random oracle model is guaranteed hardness inverting OWF. formally evaluate TREVERSE capability with two SimPUFs experimentally derived from popular silicon PUFs.
منابع مشابه
Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible?
Physically unclonable functions (PUFs) exploit the unavoidable manufacturing variations of an integrated circuit (IC). Their input-output behavior serves as a unique IC ‘fingerprint’. Therefore, they have been envisioned as an IC authentication mechanism, in particular for the subclass of so-called strong PUFs. The protocol proposals are typically accompanied with two PUF promises: lightweight ...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملCryptographically Secure CRC for Lightweight Message Authentication
A simple and practical hashing scheme based on Cyclic Redundancy Check (CRC) is presented. Similarly to previously proposed cryptographically secure CRCs, the presented one detects both, random and malicious, errors without increasing bandwidth. However, we use a product of irreducible polynomials instead of a single irreducible polynomial for generating the CRC. This is an advantage since smal...
متن کاملSecure and Lightweight Authentication Protocol for Mobile RFID Privacy
A mobile RFID system is a radio frequency identification technology that allows users to read the information on its tags. When this free reading function is combined with a mobile RFID system featuring radio frequency identification, it may violate an individuals privacy. This is because others may obtain personal information by reading the tags. In addition, user tracking can be a problem, be...
متن کاملSymmetric Authentication within a Simulatable Cryptographic Library
Proofs of security protocols typically employ simple abstractions of cryptographic operations, so that large parts of such proofs are independent of cryptographic details. The typical abstraction is the Dolev-Yao model, which treats cryptographic operations as a specific term algebra. However, there is no cryptographic semantics, i.e., no theorem that says what a proof with the Dolev-Yao abstra...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing
سال: 2022
ISSN: ['1941-0018', '1545-5971', '2160-9209']
DOI: https://doi.org/10.1109/tdsc.2020.2993802