期刊文献+

一种基于PUF的两方认证与会话密钥交换协议 被引量:5

Authentication and session key exchange protocol based on Physical Uncolonable Function
下载PDF
导出
摘要 提出了一个轻量级的两方认证及会话密钥交换协议,在一个拥有PUF实体的密码设备(Device)与服务器(Server)之间进行安全认证并建立共享会话密钥。协议采用了模糊提取器来进行认证和密钥提取,同时使用伪随机函数和异或加密来进行消息认证和通信数据加密,有效降低了执行开销。协议中Server只需要获取并存储Device中PUF的一条激励-响应信息,用于后续的密钥更新与交换,避免了因采集大量的激励-响应信息而带来的存储资源的消耗和数据泄露隐患。分析表明提出的协议实现了双向认证和可靠的密钥交换,能够抵抗窃听攻击、篡改攻击、中间人攻击、DOS攻击、建模攻击、物理探测攻击等各种攻击技术。 This paper proposes a lightweight protocol that enables secure authentication between a cryptographic device(Device)and a server(Server)with a PUF entity and establishes a shared session key.The protocol uses fuzzy extractor for authentication and key extraction,and adopts the pseudo random function and XOR encryption for message authentication and data encryption communication at the same time,can effectively reduce the execution cost.In the protocol,the server only needs to store one challenge-response pair of the PUF in the device,which is used for the subsequent key update and exchange,and avoids the consumption of storage resources and data leakage problems caused by the acquisition of a large amount of challenge-response pairs.The analysis results show that the proposed protocol achieves mutual authentication and secure key exchange,can resist eavesdropping,tampering attacks,man-in-the-middle attack,DOS attack,modeling attack,invasive attack and other attack techniques.
作者 贺章擎 李红 万美琳 吴铁洲 HE Zhangqing;LI Hong;WAN Meilin;WU Tiezhou(Hubei Collaborative Innovation Center for High-efficiency Utilization of Solar Energy,Hubei University of Technology,Wuhan 430068,China;School of Computer Science,Hubei University of Technology,Wuhan 430068,China;Faculty of Physics and Electronic Technology,Hubei University,Wuhan 430062,China)
出处 《计算机工程与应用》 CSCD 北大核心 2018年第18期17-21,共5页 Computer Engineering and Applications
基金 湖北省教育厅科学技术研究重点项目(No.D20171403) 湖北省教育厅科学技术研究项目(No.B2015047)
关键词 密钥交换协议 物理不可克隆函数 模糊提取器 消息认证 key exchange protocol Physical Unclonable Function(PUF) fuzzy extractor message authentication
  • 相关文献

参考文献2

二级参考文献19

  • 1JUELS A,WEIS S A.Authenticating pervasive devices with human protocols[C] // CRYPTO 2005:Proceedings of 25th Annual International Cryptology Conference,LNCS3621.Berlin:Springer-Verlag,2005:293-308.
  • 2SARMA S,WEIS S,ENGEIS D.Radio frequency identification:Secure risks and challenges[J].RSA Laboratories Cryptobytes,2003,6(1):2-9.
  • 3WEIS S A,SARMA S E,RIVEST R L,et al.Security and privacy aspects of low-cost radio frequency identification systems[C] //Proceedings of the 1 st International Conference on Security in Pervasive Computing,LNCS 2802.Berlin: Springer-Verlag,2004:201-212.
  • 4OHKUBO M,SUZUKI K,KINOSHITA S.Hash-chain based forward-secure privacy protection scheme for low-cost RFID[C] //SCIS 2004:Proceedings of the 2004 Symposium on Cryptography and Information Security.Berlin:Springer-Verlag,2004:719-724.
  • 5MOLNAR D,WAGNER D.Privacy and security in library RFID:Issues,practices,and architectures[C] // CCS'04:Proceedings of the 1th ACM Conference on Computer and Communications Security.New York:ACM Press,2004:210-219.
  • 6RHEE K,KWAK J,KIM S,et al.Challenge-response based RFID authentication protocol for distributed database environment[C] //SPC 2005:Proceedings of the 2nd International Conference on Security in Pervasive Computing,LNCS 3450.Berlin:Springer-Verlag,2005:70-84.
  • 7CHIEN H Y.SASI:A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity[J].IEEE Transactions on Dependable and Secure Computing,2007,4(4):337-340.
  • 8YUKSEL K. Universal hashing for ultra-low-power cryptographic hardware applications[D].Worcester:Worcester Polytechnic Institute,Electrical & Computer Engineering Department,2004.
  • 9FELDHOFER M,DOMINIKUS S,WOLKERSTORFER J.Strong authentication for RFID systems using the AES algorithm[C] //Proceedings of CHES.New York:ACM Press,2004:85-140.
  • 10SUH G E,DEVADAS D.Physical unclonable functions for device authentioation and secret key generation[C] // DAC'07:Proceedings of the 44th Annual Design Automation Conference.New York:ACM Press,2007:9-14.

共引文献13

同被引文献30

引证文献5

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部