TY - GEN
T1 - Password Manager Combining Hashing Functions and Ternary PUFs
AU - Cambou, Bertrand
N1 - Publisher Copyright:
© 2019, Springer Nature Switzerland AG.
PY - 2019
Y1 - 2019
N2 - Hashing functions protect passwords against various hacking techniques because message digests can replace the passwords when stored in the network for future authentication. However, the message digests remain exposed to password guessing attacks, most hashing functions are known, and public. The objective of the protocols presented in this paper is to offer additional lines of defense using physical unclonable functions to convert the message digests into challenge-response pairs. The use of ternary physical unclonable functions reduces false rejection rates, and lowers the latencies during the processing of the authentications. Without having access to the PUFs, the look up tables storing challenge-response pairs are more difficult to attack than those storing message digests: they are unclonable, contain high levels of randomness, and quasi unique. The modeling efforts, and algorithms developed in this paper to validate the schemes, use commercially available components, and SRAM based ternary PUFs.
AB - Hashing functions protect passwords against various hacking techniques because message digests can replace the passwords when stored in the network for future authentication. However, the message digests remain exposed to password guessing attacks, most hashing functions are known, and public. The objective of the protocols presented in this paper is to offer additional lines of defense using physical unclonable functions to convert the message digests into challenge-response pairs. The use of ternary physical unclonable functions reduces false rejection rates, and lowers the latencies during the processing of the authentications. Without having access to the PUFs, the look up tables storing challenge-response pairs are more difficult to attack than those storing message digests: they are unclonable, contain high levels of randomness, and quasi unique. The modeling efforts, and algorithms developed in this paper to validate the schemes, use commercially available components, and SRAM based ternary PUFs.
KW - Hash functions
KW - Password management
KW - Physical unclonable function
KW - Ternary states
UR - http://www.scopus.com/inward/record.url?scp=85069474390&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85069474390&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-22868-2_37
DO - 10.1007/978-3-030-22868-2_37
M3 - Conference contribution
AN - SCOPUS:85069474390
SN - 9783030228675
T3 - Advances in Intelligent Systems and Computing
SP - 494
EP - 513
BT - Intelligent Computing - Proceedings of the 2019 Computing Conference
A2 - Arai, Kohei
A2 - Bhatia, Rahul
A2 - Kapoor, Supriya
PB - Springer-Verlag
T2 - Computing Conference, 2019
Y2 - 16 July 2019 through 17 July 2019
ER -