Mutual authentication method between PUFs

Yunyeong Choi, Jungwon Lee, Hyungsoon Shin, Wookyung Sun

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper proposes a new authentication method that enables mutual verification between two different PUFs without a server. The output signal (response) of one PUF is hidden in the opponent's input signal (challenge) list by interlinking the challenge and response information of the two PUFs. In this way, when sending and receiving authentication information, a challenge list index is used instead of exposing the challenge or response information to the network directly. The verification information for checking the validity of the received index is protected with encryption using a hash function. Also, two novel PUF systems, key-map PUF and cube PUF, are presented that improve the security of the PUF-based system using previous authentication information. The proposed authentication method and PUF systems can be used for IoT devices.

Original languageEnglish
Title of host publicationInternational Conference on Electrical, Computer, and Energy Technologies, ICECET 2022
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781665470872
DOIs
StatePublished - 2022
Event2022 IEEE International Conference on Electrical, Computer, and Energy Technologies, ICECET 2022 - Prague, Czech Republic
Duration: 20 Jul 202222 Jul 2022

Publication series

NameInternational Conference on Electrical, Computer, and Energy Technologies, ICECET 2022

Conference

Conference2022 IEEE International Conference on Electrical, Computer, and Energy Technologies, ICECET 2022
Country/TerritoryCzech Republic
CityPrague
Period20/07/2222/07/22

Bibliographical note

Funding Information:
The paper was developed with funds from the National Research Foundation of Korea (NRF) (NRF-2020R1I1A1A01065622)

Publisher Copyright:
© 2022 IEEE.

Keywords

  • Cube PUF
  • hardware-based security system
  • key-map PUF
  • mutual authentication
  • physical unclonable functions

Fingerprint

Dive into the research topics of 'Mutual authentication method between PUFs'. Together they form a unique fingerprint.

Cite this