Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions

Autor: Dina Ghanaimiandoab, Kaitlyn Lee, Bertrand Cambou, Jordan Wright, Christopher Philabaum, Michael Gowanlock, Alyssa Stenberg, Bahattin Yildiz, Stefan Nelson
Jazyk: angličtina
Rok vydání: 2021
Předmět:
Computer science
Physical unclonable function
Cryptography
02 engineering and technology
lcsh:Technology
Public-key cryptography
lcsh:Chemistry
020204 information systems
Certificate authority
0202 electrical engineering
electronic engineering
information engineering

General Materials Science
Elliptic curve cryptography
Instrumentation
lcsh:QH301-705.5
Quantum computer
Fluid Flow and Transfer Processes
public key infrastructure
Post-quantum cryptography
Lattice cryptography
business.industry
lcsh:T
Process Chemistry and Technology
General Engineering
Public key infrastructure
code cryptography
lcsh:QC1-999
020202 computer hardware & architecture
Computer Science Applications
high performance computing
physical unclonable function
lcsh:Biology (General)
lcsh:QD1-999
lcsh:TA1-2040
business
lcsh:Engineering (General). Civil engineering (General)
lcsh:Physics
Computer network
post quantum cryptography
Zdroj: Applied Sciences
Volume 11
Issue 6
Applied Sciences, Vol 11, Iss 2801, p 2801 (2021)
ISSN: 2076-3417
DOI: 10.3390/app11062801
Popis: Lattice and code cryptography can replace existing schemes such as elliptic curve cryptography because of their resistance to quantum computers. In support of public key infrastructures, the distribution, validation and storage of the cryptographic keys is then more complex for handling longer keys. This paper describes practical ways to generate keys from physical unclonable functions, for both lattice and code-based cryptography. Handshakes between client devices containing the physical unclonable functions (PUFs) and a server are used to select sets of addressable positions in the PUFs, from which streams of bits called seeds are generated on demand. The public and private cryptographic key pairs are computed from these seeds together with additional streams of random numbers. The method allows the server to independently validate the public key generated by the PUF, and act as a certificate authority in the network. Technologies such as high performance computing, and graphic processing units can further enhance security by preventing attackers from making this independent validation when only equipped with less powerful computers.
Databáze: OpenAIRE