TU Darmstadt / ULB / TUbiblio

Converse PUF-Based Authentication

Sadeghi, Ahmad-Reza and Kocabaş, Ünal and Katzenbeisser, Stefan :
Converse PUF-Based Authentication.
International Conference on Trust & Trustworthy Computing (TRUST) Springer
[Conference or Workshop Item] , (2012)

Abstract

Physically Unclonable Functions (PUFs) are key tools in the construction of lightweight authentication and key exchange protocols. So far, all existing PUF-based authentication protocols follow the same paradigm: A resource-constrained prover, holding a PUF, wants to authenticate to a resource-rich verifier, who has access to a database of pre-measured PUF challenge-response pairs (CRPs). In this paper we consider application scenarios where all previous PUF-based authentication schemes fail to work: The verifier is resource-constrained (and holds a PUF), while the prover is resource-rich (and holds a CRP-database). We construct the first and efficient PUF-based authentication protocol for this setting, which we call converse PUF-based authentication. We provide an extensive security analysis against passive adversaries, show that a minor modification also allows for authenticated key exchange and propose a concrete instantiation using controlled Arbiter PUFs.

Item Type: Conference or Workshop Item
Erschienen: 2012
Creators: Sadeghi, Ahmad-Reza and Kocabaş, Ünal and Katzenbeisser, Stefan
Title: Converse PUF-Based Authentication
Language: German
Abstract:

Physically Unclonable Functions (PUFs) are key tools in the construction of lightweight authentication and key exchange protocols. So far, all existing PUF-based authentication protocols follow the same paradigm: A resource-constrained prover, holding a PUF, wants to authenticate to a resource-rich verifier, who has access to a database of pre-measured PUF challenge-response pairs (CRPs). In this paper we consider application scenarios where all previous PUF-based authentication schemes fail to work: The verifier is resource-constrained (and holds a PUF), while the prover is resource-rich (and holds a CRP-database). We construct the first and efficient PUF-based authentication protocol for this setting, which we call converse PUF-based authentication. We provide an extensive security analysis against passive adversaries, show that a minor modification also allows for authenticated key exchange and propose a concrete instantiation using controlled Arbiter PUFs.

Title of Book: International Conference on Trust & Trustworthy Computing (TRUST)
Publisher: Springer
Uncontrolled Keywords: Secure Things;Secure Protocols
Divisions: Department of Computer Science
Department of Computer Science > Kryptographische Protokolle
Department of Computer Science > System Security Lab
Profile Areas
Profile Areas > Cybersecurity (CYSEC)
LOEWE
LOEWE > LOEWE-Zentren
LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
Date Deposited: 04 Aug 2016 10:13
Identification Number: TUD-CS-2012-0107
Export:

Optionen (nur für Redakteure)

View Item View Item