TY - GEN
T1 - Software Implementation of a SRAM PUF-Based Password Manager
AU - Assiri, Sareh
AU - Cambou, Bertrand
AU - Booher, D. Duane
AU - Mohammadinodoushan, Mohammad
N1 - Funding Information:
The author is thanking the contribution of several graduate students at the cyber-security lab at Northern Arizona University, in particular, Christopher Philabaum, Vince Rodriguez, Ian Burke, and Dina Ghanaimiandoab. Also, the author is thanking the contribution of Jazan University.
Publisher Copyright:
© 2020, Springer Nature Switzerland AG.
PY - 2020
Y1 - 2020
N2 - The main goal of narrating the password-management protocol is to reduce the prevalent attacks on cyber-physical systems such as the hacking of databases of User-ID-Password pairs and side-channel analysis. The architecture uses a hash function to hash the password and user ID has weakness can help to crack the password. So, the architecture utilizes both hash function and the Addressable Physical unclonable function (PUF) Generator (APG) to authenticate clients on the network without keeping the real format of passwords in the database. The hash function and APG together are more difficult to attack because they are unclonable, have a high level of randomness, and do not depend on storing information. This paper shows a simulation prototype for how the password manager protocol can work depending on the SHA-3-512 and SRAM PUF. Furthermore, the paper shows how to encrypt the database content of password manager by using the SRAM PUF and provides a software solution of the noise of SRAM PUF to reduce the rate of false rejections for the real user and false acceptance for the not existing user.
AB - The main goal of narrating the password-management protocol is to reduce the prevalent attacks on cyber-physical systems such as the hacking of databases of User-ID-Password pairs and side-channel analysis. The architecture uses a hash function to hash the password and user ID has weakness can help to crack the password. So, the architecture utilizes both hash function and the Addressable Physical unclonable function (PUF) Generator (APG) to authenticate clients on the network without keeping the real format of passwords in the database. The hash function and APG together are more difficult to attack because they are unclonable, have a high level of randomness, and do not depend on storing information. This paper shows a simulation prototype for how the password manager protocol can work depending on the SHA-3-512 and SRAM PUF. Furthermore, the paper shows how to encrypt the database content of password manager by using the SRAM PUF and provides a software solution of the noise of SRAM PUF to reduce the rate of false rejections for the real user and false acceptance for the not existing user.
KW - Authentication
KW - Exist user
KW - Hash functions
KW - New user
KW - Password management
KW - Physical unclonable function
KW - SRAM PUF with password manager
UR - http://www.scopus.com/inward/record.url?scp=85088537363&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85088537363&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-52243-8_26
DO - 10.1007/978-3-030-52243-8_26
M3 - Conference contribution
AN - SCOPUS:85088537363
SN - 9783030522421
T3 - Advances in Intelligent Systems and Computing
SP - 361
EP - 379
BT - Intelligent Computing - Proceedings of the 2020 Computing Conference
A2 - Arai, Kohei
A2 - Kapoor, Supriya
A2 - Bhatia, Rahul
PB - Springer
T2 - Science and Information Conference, SAI 2020
Y2 - 16 July 2020 through 17 July 2020
ER -