Unequally powered cryptography using physical unclonable functions

    公开(公告)号:US11303462B2

    公开(公告)日:2022-04-12

    申请号:US16683943

    申请日:2019-11-14

    发明人: Bertrand F Cambou

    IPC分类号: H04L9/32 H04L29/06 H04L9/08

    摘要: Systems and methods of authentication and encrypted communication between a server and client using independently-generated shared encryption keys are disclosed. Clients with arrays of physical-unclonable-function devices respond to server-issued challenges. The clients derive encryption keys from responses to those challenges generated by measuring PUF devices specified by the challenges. The clients send messages encrypted with the encryption keys to the server. The server independently reproduces the client-generated encryption keys using information about the PUF devices. When the keys match, the clients are authenticated. It may be desirable to inject errors into the challenge responses generated by the clients to improve security. When errors are injected, attackers cannot determine correct challenge responses except by brute force. When a sufficiently large number of errors are introduced, the server has sufficient computational power to successfully authenticate the client, but is computationally infeasible for an attacker to reverse engineer the correct responses.

    Keyless encrypting schemes using physical unclonable function devices

    公开(公告)号:US11233662B2

    公开(公告)日:2022-01-25

    申请号:US16724739

    申请日:2019-12-23

    发明人: Bertrand F Cambou

    IPC分类号: H04L29/06 H04L9/32 H04L9/06

    摘要: Systems and methods of encrypted communication between a server and client devices using keyless encryption schemes are disclosed. Client devices with arrays of physical-unclonable-function devices respond to challenges from a server. Characteristics of the arrays are stored by the server during a secure enrollment process. Subsequently, the server issues challenges to the clients. The clients derive a ciphertext according to a variable cipher scheme determined using responses to the challenges issued by the server using characteristics of portions of the arrays specified by the challenges. The server and clients may independently determine encryption and decryption procedures using characteristics of the arrays.