2021
DOI: 10.3390/app11062801
|View full text |Cite
|
Sign up to set email alerts
|

Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions

Abstract: Lattice and code cryptography can replace existing schemes such as elliptic curve cryptography because of their resistance to quantum computers. In support of public key infrastructures, the distribution, validation and storage of the cryptographic keys is then more complex for handling longer keys. This paper describes practical ways to generate keys from physical unclonable functions, for both lattice and code-based cryptography. Handshakes between client devices containing the physical unclonable functions … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 8 publications
0
11
0
Order By: Relevance
“…These random numbers are used as symmetric encryption keys that are encapsulated by the more deterministic PUF responses. [17]…”
Section: Use Of Pufs and Enrollmentmentioning
confidence: 99%
See 1 more Smart Citation
“…These random numbers are used as symmetric encryption keys that are encapsulated by the more deterministic PUF responses. [17]…”
Section: Use Of Pufs and Enrollmentmentioning
confidence: 99%
“…Only a server that has knowledge of the expected value of the response from the PUF, is capable of guessing the actual response from the PUF once it has been hashed. [17] RBC also allows us to intentionally inject noise into the actual PUF response by including responses from fuzzy cells. With noise injection, the Hamming distance between the actual PUF response and the expected PUF response increases thus the computing power on the server end must also increase in order for the actual PUF response to be verified in a reasonable amount of time.…”
Section: Error Sources and Correction With Pufsmentioning
confidence: 99%
“…Attacks based on differential power analysis can extract cryptographic keys during the encryption and decryption process. Quantum adversaries are targeting key extractions as well [1]. Internet of things (IoT) devices are being used more and more in everyday life.…”
Section: Introductionmentioning
confidence: 99%
“…These tools depend on each other to build the keyless protocol. So, this section will give a brief description of the tools before explaining the keyless protocol steps [1].…”
Section: Introductionmentioning
confidence: 99%
“…It is now anticipated that quantum computers (QC) will be able to break both RSA and ECC when the technology to manufacture enough quantum nodes becomes available. Paper [9] describes practical ways to generate keys from physical unclonable functions, for both lattice and code-based cryptography and proposes to generate the public-private key pairs by replacing the random number generators with data streams generated from addressable physical unclonable functions (PUFs) to obtain the seeds needed in the post quantum cryptographic (PQC) algorithms. Dissimilar to the key pairs computed by PQC algorithms, the seeds are relatively short, typically 256-bits long.…”
mentioning
confidence: 99%