期刊文献+

一种基于PUF的PBE系统 被引量:2

A PUF-based PBE System
下载PDF
导出
摘要 为提高PBE(Password Base Encryption,PBE)系统的安全性,提出了一种基于PUF(PhysicalUnclonable Function,PUF)的PBE 系统设计。系统中使用PUF 替代传统伪随机数发生器,通过使用PUF 的激励响应对(Challenge Response Pair,CRP)和辅助数据,系统可实现盐的生产和盐的重建,并进一步构造密钥。因为PUF 具有物理不可克隆性,且不需要传统非易失性存储器,所以PUF 可以大幅度提高PBE 系统的抗字典攻击和抗克隆攻击能力,同时有效保证密钥存储的安全性,大大降低密钥管理和维护的成本。 In order to improve the security of PBE (Password Base Encryption, PBE) system, the PBE system design based on PUF (Physical Unclonable Function) is proposed. The system, by using PUF instead of the traditional pseudo-random number generator, CRP (Challenge Response Pair, CPR) and the auxiliary data, can realize the production and reconstruction of the Salt, and further construct the encryption key. Because its having physical unclonability and requiring no traditional non-volatile memory, PUF can greatly improve the anti-dictionary and anti-cloning attacks of PBE system, while effectively guaranteeing the security of key storage and greatly reducing the cost of key management and maintenance.
作者 咸凛 郝嘉 XIAN Lin;HAO Jia(No.30 Institute of CETC,Chengdu Sichuan 610000,China)
出处 《通信技术》 2019年第5期1224-1227,共4页 Communications Technology
关键词 PUF PBE CRP PUF PBE CRP Salt
  • 相关文献

参考文献2

二级参考文献38

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Lamport L. Password authentication with insecure communieation [ J ]. Commun ACM, 1981,24 ( 11 ) :770 - 772.
  • 3Jablan D P. Strong password - only authenticated key exchange [ J ]. Computer Communication Review, 1996,26 (5):5-26.
  • 4Wu T C,Sung H S. Authenticating passwords over an insecure channel [ J]. Computers and Security, 1996, 15 (5) :431 -439.
  • 5Dodis Y, Reyzin L, Smith A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data [ C ]//Cachin, J. camenisch. 23rd Annual Eurocrypt Con- ference. Interlaken, SWITZERLAND. [ S. 1. ] : [ s. n. ], 2004:523 - 540.
  • 6Dodis Y, Ostrovsky R, Reyzin L. Fuzzy extractors : How to generate strong keys from biometrics and other noisy data [J]. Siam Journal on Computing,2008,38( 1 ) :97 - 139.
  • 7Yao A C. THEORY AND APPLICATIONS OF TRAP- DOOR FUNCTIONS [ C]//23rd Annual Symposium on Foundations of Computer Science. Chicago : IEEE, 2003 : 80 -91.
  • 8Nisan N,Zuckerman D. Randomness is linear in space [ J]. Journal of Computer and System Sciences, 1996,52 (1) :43 -52.
  • 9Boyen X, Dodis Y, Katz J. Secure remote authentication using biometric data [ J ]. Advances in Cryptology, 2005, 3494 : 147 - 163.
  • 10Dodis Y, Katz J, Reyzin L. Robust fuzzy extractors and authenticated key agreement from close secrets [ C ]// 26th Annual International Cryptology Conference. CRYPTO 2006, August 20,2006 - August 24,2006. Seattle, WA, United states. [ S. l. ] : Springer Verlag, 2006 : 232 - 250.

共引文献23

同被引文献13

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部