Physical unclonable function-based encryption schemes with combination of hashing methods

    公开(公告)号:US11496326B2

    公开(公告)日:2022-11-08

    申请号:US17160072

    申请日:2021-01-27

    Abstract: A system is configured to derive a set of encryption keys from measured device characteristics of at least one PUF device and communicate with a remote device by performing a cryptographic operation secured by the set of encryption keys. The cryptographic operation includes segmenting a first data stream into a first plurality of data stream fragments, segmenting a first data stream fragment of the first plurality of data stream fragments into a first numeric value and a second numeric value, identifying, using the first numeric value, a first encryption key of the set of encryption keys, and applying a one-way cryptographic function to the first encryption key a first number of times determined by the second numeric value to generate a transformed fragment having a value that depends on the values of the first numeric value and the second numeric value from the first data stream fragment and a value of the first encryption key.

    Secure enrollment for physical unclonable function devices

    公开(公告)号:US11343109B2

    公开(公告)日:2022-05-24

    申请号:US16900675

    申请日:2020-06-12

    Abstract: Systems and methods for secure enrollment of physical unclonable function devices include providing a device with an enrollment controller. The enrollment controller receives an enrollment request from an enrollment system and authenticates the request. If the request is authentic, the enrollment controller generates challenges in a pseudorandom order determined by a random seed that is shared with the enrollment system. The enrollment controller issues the challenges to interrogation circuitry coupled to a PUF array and records the responses. The responses are transmitted in encrypted form, and in the pseudorandom order, to the enrollment system. The responses are encrypted using a random number shared with the enrollment system. The enrollment system and the enrollment controller can independently generate the encryption key using the shared random number and/or other securely shared information.

    METHODS AND SYSTEMS FOR GENERATING UNCLONABLE OPTICAL TAGS

    公开(公告)号:US20220121900A1

    公开(公告)日:2022-04-21

    申请号:US17505547

    申请日:2021-10-19

    Abstract: Systems and methods for authenticating dendritic product tags are disclosed. An authentication authority fabricates and digitally images a dendrite. A shape of the dendrite is numerically modeled as a graph including nodes. The nodes correspond to seed, bifurcation and termination points of the dendrite. Each node is associated in a database with a two value vector corresponding to the length and orientation of a linear approximation of the branch terminating at the node. This model is compared to a model built by a remote application of a dendritic tag encountered in the field, and product information including an indication of authenticity is sent if the models match. Matching occurs by an ad-hoc comparison between nodes in the models, which comparison involves comparing child, parent and sibling nodes.

    Encoding data for cells in a PUF that corresponds to a challenge in a challenge response pair

    公开(公告)号:US10432410B2

    公开(公告)日:2019-10-01

    申请号:US16036477

    申请日:2018-07-16

    Inventor: Bertrand Cambou

    Abstract: The present invention provides a method for authenticating distributed peripherals on a computer network using an array of physically unclonable functions (PUF). As each PUF is unique, each PUF is able to generate a plurality of challenge response pairs that are unique to that PUF. The integrated circuits of the PUF comprise a plurality of cells, where a parameter (such as a voltage) of each cell may be measured (possibly averaged over many readings). The plurality of cells in the PUF may be arranged in a one, two or more dimensional matrix. A protocol based on an addressable PUF generator (APG) allows the protection of a network having distributed peripherals such as Internet of things (IoT), smart phones, lap top and desk top computers, or ID cards. This protection does not require the storage of a database of passwords, or secret keys, and thereby is immune to traditional database hacking attacks.

Patent Agency Ranking