Lightweight security authentication method based on XOR-APUF

A technology of XOR-APUF and security authentication, which is applied in the field of lightweight security authentication methods, can solve problems such as breaching and consuming hardware circuit resources, and achieve the effect of ensuring security

Active Publication Date: 2020-12-01
SOUTHEAST UNIV
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

In this new technology, there are two methods - one called VonNeuman Encoding (VNE) encoding and another called Reverse Fuzzy Extractor (RFE). These techniques help protect sensitive data from being copied or cracked into malware without compromising their integrity. They also provide secure communication channels through various means like passwords or biometric identification codes. Overall these technical improvements improve protection against computerized threats such as man-invasive adversarial examples.

Problems solved by technology

This patented technical issue addressed in this patents relates to improving physical Unclonatable Function (PU F)-Based Authentication Protocols: Current methods require strong PUs like PRIs, making it difficult to prevent future attacks from being able to penetrate. There also exist challenges related to developing efficient ways to detect weaknesses caused by imperfections within quantum computing systems without compromising any sensitive components inside.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lightweight security authentication method based on XOR-APUF
  • Lightweight security authentication method based on XOR-APUF
  • Lightweight security authentication method based on XOR-APUF

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention designs a lightweight security authentication method based on the unclonable function XOR-APUF of the XOR gate arbitrator, the content of the method includes the registration stage and the authentication stage, and the protocol entities include tokens and servers,

[0037] The registration phase has the following steps:

[0038] Step 1: The server uses TRNG to generate a true random number as an ID and sends it to the token storage with XOR-APUF;

[0039] Step 2: The server side uses TRNG to generate a certain amount of incentives and send them to the token with XOR-APUF, and the token will input the incentives into XOR-APUF, and send the response corresponding to each incentive back to the server;

[0040] Step 3: The server uses CRPs to train the model of the evolutionary strategy algorithm, and finally obtains the XOR-APUF simulated by the software.

[0041] The authentication phase has the following steps:

[0042] Step 1: After the server re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a lightweight security authentication method based on an XOR gate arbiter unclonable function XOR-APUF. The scene of the method comprises a server side and a token side. According to the method, a reverse fuzzy extractor is constructed at a token end and used for error correction of an XOR-APUF response, a Von Noemann encoder is constructed to encode the XOR-APUF response,the encoded response is separated from original excitation by a direct mapping relation, and the intrinsic noise of an excitation response pair is improved while effective authentication is ensured. Compared with an existing authentication method based on a physical unclonable function PUFs, the machine learning attack resistance of the protocol is improved while the consumption of token hardwareresources is reduced.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products