TY - GEN
T1 - PUF-Protected Methods to Generate Session Keys
AU - Cambou, Bertrand
AU - Telesca, Donald
AU - Jacinto, H. Shelton
N1 - Publisher Copyright:
© 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.
PY - 2022
Y1 - 2022
N2 - The proposed methods protect networks of client devices connected to a server containing physical unclonable functions, by generating session keys for secure cryptographic protocols. Hostile servers without known physical unclonable functions cannot generate these session keys, thereby are not trust-worthy to the client devices. During an initial set up cycle, each client device selects a set of passwords, and picks a first set of random numbers to hash these passwords multiple times. The resulting sets of message digests are converted by the server into sets of instructions to generate some responses from the physical functions; these initial responses are stored for future reference by the server. The client device picks a second set of random numbers smaller than the first set and repeat of the same scheme; the session keys are computed from the differences between both sets of random numbers. The sever can also get access independently to the session keys by finding a group of responses from its physical function that is similar to the initial responses. The proposed pseudo-homomorphic computations never disclose to the server the set of original passwords. We are suggesting ways to optimize the levels of protections and the performance of the session key generation in terms of latencies and entropy.
AB - The proposed methods protect networks of client devices connected to a server containing physical unclonable functions, by generating session keys for secure cryptographic protocols. Hostile servers without known physical unclonable functions cannot generate these session keys, thereby are not trust-worthy to the client devices. During an initial set up cycle, each client device selects a set of passwords, and picks a first set of random numbers to hash these passwords multiple times. The resulting sets of message digests are converted by the server into sets of instructions to generate some responses from the physical functions; these initial responses are stored for future reference by the server. The client device picks a second set of random numbers smaller than the first set and repeat of the same scheme; the session keys are computed from the differences between both sets of random numbers. The sever can also get access independently to the session keys by finding a group of responses from its physical function that is similar to the initial responses. The proposed pseudo-homomorphic computations never disclose to the server the set of original passwords. We are suggesting ways to optimize the levels of protections and the performance of the session key generation in terms of latencies and entropy.
KW - Cryptographic keys
KW - Cybersecurity
KW - Physical unclonable functions
UR - http://www.scopus.com/inward/record.url?scp=85126931442&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85126931442&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-98015-3_51
DO - 10.1007/978-3-030-98015-3_51
M3 - Conference contribution
AN - SCOPUS:85126931442
SN - 9783030980146
T3 - Lecture Notes in Networks and Systems
SP - 744
EP - 764
BT - Advances in Information and Communication - Proceedings of the 2022 Future of Information and Communication Conference, FICC
A2 - Arai, Kohei
PB - Springer Science and Business Media Deutschland GmbH
T2 - Future of Information and Communication Conference, FICC 2022
Y2 - 3 March 2022 through 4 March 2022
ER -