Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A security authentication method based on sram PUF and a terminal and authentication system

A security authentication and terminal technology, applied in the field of network security, can solve problems such as reduced efficiency and increased cost, and achieve the effects of improving security, reducing implementation costs, and simplifying the structure of software and hardware

Active Publication Date: 2018-04-06
SOUTHEAST UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are obvious defects in this method: as a one-way hash function, the hash algorithm is widely used in information authentication.
There are many ways to solve this problem. One is the combination of hash algorithm and encryption algorithm, which improves the security but leads to a sharp increase in cost and a decrease in efficiency.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security authentication method based on sram PUF and a terminal and authentication system
  • A security authentication method based on sram PUF and a terminal and authentication system
  • A security authentication method based on sram PUF and a terminal and authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] Aiming at the security problem of the existing SRAM PUF-based authentication system, the present invention proposes a security authentication method, which divides the nodes of the SRAM PUF module into random nodes and authentication nodes, and uses the authentication nodes and random nodes respectively when performing authentication. Generate an authentication sequence and a random number sequence, and then use the generated random number sequence to perform a salted hash operation on the authentication sequence, thereby effectively improving the security of the authentication process and reducing the complexity of the terminal device.

[0047] The security authentication method of the present invention includes a registration stage and an authentication stage,

[0048] The registration phase includes the following steps:

[0049] Step 1. The terminal with the SRAM PUF module divides each node in its own SRAM PUF module into random nodes and authentication nodes in adv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security authentication method based on an SRAM PUF (Static Random Access Memory Physical Uncloable Function), and belongs to the technical field of network security. Specific to the security problem of an existing authentication system based on the SRAM PUF, the invention discloses the security authentication method. Nodes of an SRAM PUF module are classified into random nodes and authentication nodes. During authentication, an authentication sequence and a random number sequence are generated respectively by using the authentication nodes and the random nodes, and salting Hash operation is performed on the authentication sequence by using the generated random number sequence, so that the security of an authentication process is enhanced effectively, and the complexity of terminal equipment is lowered. The invention also discloses a terminal and an authentication system. Through adoption of the security authentication method, the terminal and the authentication system, the security of the authentication process can be enhanced greatly. Moreover, the security authentication method, the terminal and the authentication system are easily compatible with existing equipment, and have good application prospects.

Description

technical field [0001] The invention relates to a security authentication method, in particular to a security authentication method based on SRAM PUF (Static Random Access Memory Physically Unclonable Function), and belongs to the technical field of network security. Background technique [0002] PUF (Physical Unclonable Functions, physical unclonable functions, or PUFs for short) widely exists in existing mobile and Internet terminal devices. Relevant papers and monographs at home and abroad have made various definitions of physical unclonable functions. Generally speaking, physical unclonable functions refer to a physical entity that can rely on differences in the manufacturing process to produce its unique output. (usually binary), these outputs are difficult to clone. Each component of PUFs has local parameter differences. Through PUFs "algorithm", these local differences will be combined, compared or directly output to form the unique binary output of the circuit. PUF...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0866H04L9/3278
Inventor 李冰陈帅顾巍杨宇董乾刘勇赵霞王刚
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products