Authentication Schemes based on Physically Unclonable Functions
PublicDownloadable Content
open in viewerIn this project we investigate different hardware authentication schemes based on Physically Unclonable Functions. We start by analyzing the concepts of a fuzzy extractor and a secure sketch from an information-theoretic perspective. We then present a hardware implementation of a fuzzy extractor which uses the code offset construction with BCH codes. Finally, we propose a new cryptographic protocol for PUF authentication based upon polynomial interpolation using Sudan's list-decoding algorithm. We provide preliminary results into the feasibility of this protocol, by looking at the practicality of finding a polynomial that can be assigned as a cryptographic key to each device.
- This report represents the work of one or more WPI undergraduate students submitted to the faculty as evidence of completion of a degree requirement. WPI routinely publishes these reports on its website without editorial or peer review.
- Creator
- Publisher
- Identifier
- E-project-043009-165529
- Award
- Advisor
- Year
- 2009
- Date created
- 2009-04-30
- Resource type
- Major
- Rights statement
- Last modified
- 2023-01-20
Relations
- In Collection:
Items
Items
Thumbnail | Title | Visibility | Embargo Release Date | Actions |
---|---|---|---|---|
Ilan_Shomorony_MQP.pdf | Public | Download |
Permanent link to this page: https://digital.wpi.edu/show/kd17cv66n