Robust computational fuzzy extractor and method for authentication

A technology for device authentication and message authentication code, applied in the field of cryptography, which can solve problems such as insufficient security

Active Publication Date: 2022-07-15
ROBERT BOSCH GMBH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this is not sufficient in terms of security if the PUF response is used to derive the symmetric key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Robust computational fuzzy extractor and method for authentication
  • Robust computational fuzzy extractor and method for authentication
  • Robust computational fuzzy extractor and method for authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] For the purpose of promoting an understanding of the principles of the present disclosure, reference will now be made to the embodiments illustrated in the drawings and described in the following written specification. It should be understood that no limitation of the scope of the present disclosure is therefore intended. It is further to be understood that this disclosure includes any alterations and modifications to the illustrated embodiments and includes further applications of the principles of this disclosure, as will commonly occur to those skilled in the art to which this disclosure pertains.

[0014] figure 1 A system 100 is shown that includes a proving device 102 (also referred to herein as a "certifier") and a verification device 104 (also referred to herein as a "verifier"). Attestation device 102 and verification device 104 via insecure communication channels such as network 106 (eg, the Internet, wireless local area network, or wireless mesh network) or ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method and system for authenticating a device is disclosed. The method includes the steps of: receiving a helper bit string and a first MAC; measuring a first response bit string of a physical unclonable function of the device with respect to a challenge bit string; subtracting the first response bit from the helper bit string string; decodes the result of the subtraction using a uniformly distributed random matrix, if the helper bit string is encoded using a previously measured second response bit string within a threshold level of similarity to the first response bit string , then providing the shared secret bit string from the decoding, otherwise the decoding outputs an error value; determining a second MAC based on the shared secret bit string, the uniformly distributed random matrix, and the helper bit string; and It is determined whether the second MAC matches the first MAC.

Description

[0001] This application claims the benefit of priority from US Provisional Application Serial No. 62 / 440,728, filed December 30, 2016, the disclosure of which is incorporated herein by reference in its entirety. technical field [0002] The methods and devices disclosed in this document relate to cryptography, and more particularly to the use of physically unclonable functions and fuzzy extractors for device authentication. Background technique [0003] In some applications, a Physically Unclonable Function (PUF) is used to authenticate the device. However, the raw response of any PUF is noisy and must be post-processed to derive eg the exact same key each time the PUF is queried. The blur extractor can be constructed with an error correcting code and used to remove noise from the original response of the PUF using publicly available so-called helper data. Due to the nature of error-correcting codes (and the redundant information present in the helper data), traditional inf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
CPCH04L9/3278H04L9/085H04L9/3242H04W12/06
Inventor J.瓜哈尔多梅尔尚P.杜普利斯C.胡特
Owner ROBERT BOSCH GMBH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products