TREVERSE: TRial-and-Error Lightweight Secure ReVERSE Authentication With Simulatable PUFs

نویسندگان

چکیده

A physical unclonable function (PUF) generates hardware intrinsic volatile secrets by exploiting uncontrollable manufacturing randomness. Although PUFs provide the potential for lightweight and secure authentication increasing numbers of low-end Internet Things devices, practical mechanisms remain elusive. We aim to explore simulatable (SimPUFs) that are physically but efficiently modeled mathematically through privileged one-time PUF access address above problem. Given a challenge, securely stored SimPUF in possession trusted server computes corresponding response its bit-specific reliability. Consequently, naturally noisy responses generated resource limited prover can be immediately processed one-way (OWF) transmitted server, because resourceful exploit perform trial-and-error search over likely error patterns recover authenticate prover. Security reverse (TREVERSE) under random oracle model is guaranteed hardness inverting OWF. formally evaluate TREVERSE capability with two SimPUFs experimentally derived from popular silicon PUFs.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible?

Physically unclonable functions (PUFs) exploit the unavoidable manufacturing variations of an integrated circuit (IC). Their input-output behavior serves as a unique IC ‘fingerprint’. Therefore, they have been envisioned as an IC authentication mechanism, in particular for the subclass of so-called strong PUFs. The protocol proposals are typically accompanied with two PUF promises: lightweight ...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

Cryptographically Secure CRC for Lightweight Message Authentication

A simple and practical hashing scheme based on Cyclic Redundancy Check (CRC) is presented. Similarly to previously proposed cryptographically secure CRCs, the presented one detects both, random and malicious, errors without increasing bandwidth. However, we use a product of irreducible polynomials instead of a single irreducible polynomial for generating the CRC. This is an advantage since smal...

متن کامل

Secure and Lightweight Authentication Protocol for Mobile RFID Privacy

A mobile RFID system is a radio frequency identification technology that allows users to read the information on its tags. When this free reading function is combined with a mobile RFID system featuring radio frequency identification, it may violate an individuals privacy. This is because others may obtain personal information by reading the tags. In addition, user tracking can be a problem, be...

متن کامل

Symmetric Authentication within a Simulatable Cryptographic Library

Proofs of security protocols typically employ simple abstractions of cryptographic operations, so that large parts of such proofs are independent of cryptographic details. The typical abstraction is the Dolev-Yao model, which treats cryptographic operations as a specific term algebra. However, there is no cryptographic semantics, i.e., no theorem that says what a proof with the Dolev-Yao abstra...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing

سال: 2022

ISSN: ['1941-0018', '1545-5971', '2160-9209']

DOI: https://doi.org/10.1109/tdsc.2020.2993802