Abstract :
As an alternative to tamper-resistant modules, PUFs (Physically Unclonable Functions) [1], [6], [7], [8], [9], [10], [11], [14], [15], [18], [25], [26] have received much attention due to their unclonable physical characteristics. In this paper, we propose key establishment (KE1 and KE2) protocols using PUFs which can mitigate side-channel attacks and satisfy two security requirements (i.e., Freshness and Non-Regeneration). Also, we discuss security of the KE1 and KE2 protocols, and compare with the previous PUF-based key exchange protocols [3], [4], [27].
Keywords :
"Protocols","Cryptography","Decoding","Error correction codes","Proposals","Scientific computing"