Authentication Schemes based on Physically Unclonable Functions
公开In this project we investigate different hardware authentication schemes based on Physically Unclonable Functions. We start by analyzing the concepts of a fuzzy extractor and a secure sketch from an information-theoretic perspective. We then present a hardware implementation of a fuzzy extractor which uses the code offset construction with BCH codes. Finally, we propose a new cryptographic protocol for PUF authentication based upon polynomial interpolation using Sudan's list-decoding algorithm. We provide preliminary results into the feasibility of this protocol, by looking at the practicality of finding a polynomial that can be assigned as a cryptographic key to each device.
- This report represents the work of one or more WPI undergraduate students submitted to the faculty as evidence of completion of a degree requirement. WPI routinely publishes these reports on its website without editorial or peer review.
- Creator
- Publisher
- Identifier
- E-project-043009-165529
- Award
- Advisor
- Year
- 2009
- Date created
- 2009-04-30
- Resource type
- Major
- Rights statement
- 最新修改
- 2023-01-20
关系
- 属于 Collection:
项目
Permanent link to this page: https://digital.wpi.edu/show/kd17cv66n