Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Pseudo-random generation of matrices for computational fuzzy extractor and method for authentication

A random matrix and random vector technology, applied in the field of cryptography, can solve problems such as insufficient security

Active Publication Date: 2019-08-02
ROBERT BOSCH GMBH
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this is insufficient in terms of security if the PUF response is used to derive a symmetric key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Pseudo-random generation of matrices for computational fuzzy extractor and method for authentication
  • Pseudo-random generation of matrices for computational fuzzy extractor and method for authentication
  • Pseudo-random generation of matrices for computational fuzzy extractor and method for authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] For the purposes of promoting an understanding of the principles of the disclosure, reference will now be made to the embodiments illustrated in the drawings and described in the following written description. It is to be understood that no limitation of the scope of the present disclosure is thereby intended. It is also to be understood that this disclosure includes any alterations and modifications to the illustrated embodiments, and also further applications of the principles of the disclosure as would normally occur to one skilled in the art to which this disclosure pertains.

[0014] figure 1 A system 100 is shown that includes an attestation device 102 (also referred to herein as a "certifier") and attestation device 104 (also referred to herein as a "certifier"). The proving device 102 and proving device 104 communicate via an insecure communication channel such as a network 106 (eg, the Internet, a wireless local area network, or a wireless mesh network) or a d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for authenticating a first device is disclosed. In one embodiment, the method includes the steps of: receiving a helper bit string from a second device that is remote from the first device; measuring a first response bit string of a physical unclonable function of the first device with respect to a challenge bit string; subtracting the first response bit string from the helper bit string;reconstructing a random matrix using a pseudo-random number generator initialized with a seed; and decoding a result of the subtraction using the random matrix, the shared secret bit string being provided from the decoding if the helper bit string was encoded using a previously measured second response bit string that is within a threshold level of similarity to the first response bit string, thedecoding outputting an error value otherwise.

Description

[0001] This application claims the benefit of priority to US Provisional Application Serial No. 62 / 440,744, filed December 30, 2016, the disclosure of which is incorporated herein by reference in its entirety. technical field [0002] The methods and devices disclosed in this document relate to cryptography, and more specifically to the use of physically unclonable functions and obfuscated extractors for device authentication. Background technique [0003] In some applications, physically unclonable functions (PUFs) are used to authenticate devices. However, the raw response of any PUF is noisy and must be post-processed to derive eg an equivalence key each time the PUF is queried. A fuzzy extractor can be constructed with an error correction code and used to remove noise from the raw response of the PUF using publicly available so-called helper data. Due to the nature of error-correcting codes (and the redundant information present in the helper data), conventional informa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3278G06F7/582G06F17/16
Inventor J.瓜哈尔多梅尔尚P.杜普利斯C.胡特
Owner ROBERT BOSCH GMBH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products