Two-party authentication and session key exchange method based on bst-puf

A technology of session key and key exchange, which is applied in the field of communication technology and information security to achieve the effect of high security

Active Publication Date: 2020-10-02
HUBEI UNIV OF TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the BST-PUF circuit can generate a large number of stimulus-response-reliability bit pairs, and the external circuit can select those reliable output bits to construct the digital key, but the BST-PUF circuit has not been applied in the key exchange field

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-party authentication and session key exchange method based on bst-puf
  • Two-party authentication and session key exchange method based on bst-puf
  • Two-party authentication and session key exchange method based on bst-puf

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0054] like figure 1 As shown, the two-party authentication and session key exchange method based on BST-PUF of the present invention, the device based on it includes a device end 1 and a server end 2, and the device end 1 includes a non-volatile memory module 3, and also includes:

[0055] BST-PUF module 4: Input an incentive information with a length of L bits, L is a positive integer, output a PUF response value of L bits and a reliability identification value of L bits, wherein the i-th bit in the reliability identification value The value identifies the reliability of the i-th bit output in the corresponding response. When the i-th bit value in the reliability identification value is 1, it proves that the i-th bit output in the response value is reliable, otherwise it is unreliable;

[0056] Key extraction module 5: input the L...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of communication technology and information safety, and discloses a BST-PUF-based two-party authentication and session key exchange method, which comprises an equipment end and a server end, realizes key generation and exchange through a BST-PUF circuit, and performs bidirectional authentication and XOR encryption by using a pseudo-random function and XOR operation. According to the two-party authentication and session key exchange method based on the BST-PUF, a stable key can be obtained without using an error correction mechanism, bidirectional authentication and reliable key exchange are realized, and various attack technologies can be resisted.

Description

technical field [0001] The invention relates to the field of communication technology and information security, in particular to a BST-PUF-based two-party authentication and session key exchange method. Background technique [0002] When communicating in an insecure network, especially a wireless network, the transmitted information needs to be encrypted, and the communicating parties need to negotiate to establish a public session key, which can be used to encrypt messages in the subsequent data exchange process. Traditional communication relies on public encryption algorithms and keys stored in non-volatile memory (NVM) for secure sessions, but now there are many new physical attack techniques that try to avoid the encryption algorithm itself to directly obtain the key. Keys stored in NVM are no longer secure. [0003] Therefore, it has become a new development trend to use physical unclonable circuit (PUF) to generate and store keys. PUF is a set of miniature circuits th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0838H04L9/0869H04L9/3273H04L9/3278
Inventor 贺章擎项链高杨陈万博焦磊明吴铁洲
Owner HUBEI UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products