2023
DOI: 10.1038/s41598-023-48464-z
|View full text |Cite
|
Sign up to set email alerts
|

Designing secure PUF-based authentication protocols for constrained environments

Sang-Woong Lee,
Masoumeh Safkhani,
Quynh Le
et al.

Abstract: Physical Unclonable Functions (PUFs) are widely used in cryptographic authentication and key-agreement protocols due to their unique physical properties. This article presents a comprehensive cryptanalysis of two recently developed authentication protocols, namely PLAKE and EV-PUF, both relying on PUFs. Our analysis reveals significant vulnerabilities in these protocols, including susceptibility to impersonation and key leakage attacks, which pose serious threats to the security of the underlying systems. In t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
references
References 40 publications
0
0
0
Order By: Relevance