Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Backward Computational Fuzzy Extractor and Method for Authentication

A device authentication and processor technology, applied in the field of cryptography, can solve problems such as insufficient security

Active Publication Date: 2022-07-15
ROBERT BOSCH GMBH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this is not sufficient in terms of security if the PUF response is used to derive a symmetric key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Backward Computational Fuzzy Extractor and Method for Authentication
  • Backward Computational Fuzzy Extractor and Method for Authentication
  • Backward Computational Fuzzy Extractor and Method for Authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] For the purpose of promoting an understanding of the principles of the present disclosure, reference will now be made to the embodiments illustrated in the drawings and described in the following written specification. It will be understood that no limitation of the scope of the present disclosure is thereby intended. It is further to be understood that this disclosure includes any alterations and modifications to the illustrated embodiments and includes further applications of the principles of this disclosure as would commonly occur to one skilled in the art to which this disclosure pertains.

[0012] figure 1 A system 100 is shown that includes a proving device 102 (also referred to herein as a "certifier") and a verification device 104 (also referred to herein as a "verifier"). Attestation device 102 and verification device 104 via insecure communication channels such as network 106 (eg, the Internet, wireless local area network, or wireless mesh network) or direct...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Methods and systems for authenticating a first device are disclosed. The method comprises the steps of measuring a first response bit string of a physical unclonable function of the first device with respect to a challenge bit string, the physical unclonable function being determined by a processor of the first device and a further physical component of the first device Provided by one of; derives a shared secret bitstring from a uniformly distributed random vector; encoded by multiplying a uniformly distributed random matrix with a uniformly distributed random vector and adding the first response bitstring to the result of the multiplication an auxiliary bit string; and transmitting the auxiliary bit string to a second device remote from the first device.

Description

[0001] This application claims the benefit of priority from US Provisional Application Serial No. 62 / 440,685, filed December 30, 2016, the disclosure of which is incorporated herein by reference in its entirety. technical field [0002] The methods and devices disclosed in this document relate to cryptography and, more particularly, to the use of physically unclonable functions and fuzzy extractors for device authentication. Background technique [0003] In some applications, Physical Unclonable Functions (PUFs) are used to authenticate devices. However, the raw response of any PUF is noisy and must be post-processed to derive eg the same key each time the PUF is queried. The blur extractor can be constructed with error correcting codes and used to remove noise from the original response of the PUF using publicly available so-called auxiliary data. Due to the nature of error correcting codes (and redundant information present in the auxiliary data), traditional information-...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
CPCH04L2209/122H04L9/3278H04L9/085H04L2209/34
Inventor J.瓜加多梅尔昌P.杜普利斯C.胡特
Owner ROBERT BOSCH GMBH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products