CN106797313B - 利用动态密钥生成的网络认证系统 - Google Patents
利用动态密钥生成的网络认证系统 Download PDFInfo
- Publication number
- CN106797313B CN106797313B CN201580027307.3A CN201580027307A CN106797313B CN 106797313 B CN106797313 B CN 106797313B CN 201580027307 A CN201580027307 A CN 201580027307A CN 106797313 B CN106797313 B CN 106797313B
- Authority
- CN
- China
- Prior art keywords
- communications device
- secure communications
- secure
- identification module
- packet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3278—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
Abstract
具有动态密码生成的网络认证系统利于确立两个端点标识,以及使用两个终端设备(可能在单独的局域网上)之间动态生成的密钥的安全通信通道。交互式或非交互式认证协议用于确立目标终端设备的标识,并且动态密钥生成用于确立用于创建终端设备之间的加密通信通道的共享对称会话密钥。
Description
技术领域
本公开一般地涉及网络认证,尤其而非排他地涉及通过代换来防护篡改和破坏的认证。
相关申请的交叉引用
本申请要求2014年5月22日提交的美国临时专利申请序号62/001,979的优先权的利益且该申请通过引用方式并入。
背景技术
在线通信的主要的方面是两个端点基于它们各自的标识来建立认证通道的能力。对此的一种解决方案采用公共密钥基础设施(PKI),其中公共密钥允许终端设备被合理地确信它们仅相互通信。然而,在该方案中,端点及其标识通常是独立的,即,任意标识生成且分配给端点。
在各种设备认证方案中,物理不可克隆函数(PUF)已经被使用,使得每个设备具有本质上与该设备链接的唯一标识。Rührmair等人(“Modeling Attacks on PhysicalUnclonable Functions”,Proceedings of the 17th ACM conference on Computer andcommunications security,CCS’10,第237-249页,ACM,2010)限定了三个不同类的PUF设备:
·弱PUF通常仅用于取得私密密钥。挑战空间会受限制,并且假设响应空间永不显露。典型的构造包括SRAM(Holcomb等人,“Initial SRAM State as a Fingerprint andSource of True Random Numbers for RFID Tags”,In Proceedings of the Conferenceon RFID Security,2007),Butterfly(Kumar等人,“Extended abstract:The ButterflyPUF Protecting IP on Every FPGA”,IEEE International Workshop on Hardware-Oriented Security and Trust,第67-70页,2008),Arbiter(Lee等人,“A technique tobuild a secret key in integrated circuits for identification andauthentication applications,”,IEEE Symposium on VLSI Circuits:Digest ofTechnical Papers,第176-179页,2004),Ring Oscillator(Suh等人,“PhysicalUnclonable Functions for Device Authentication and Secret Key Generation”,Proceedings of the 44th annual Design Automation Conference,DAC’07,第9-14页,ACM,2007),以及Coating(Tuyls等人,“Read-Proof Hardware from ProtectiveCoatings”,Proceedings of the 8th international conference on CryptographicHardware and Embedded Systems,CHES’06,第369-383页,Springer,2006)PUF。
·强PUF假设:(i)物理上不可能克隆,(ii)不可能在合理的时间内收集挑战响应对的完整集合(典型地花费数周的数量级的时间),以及(iii)难以预测对随机挑战的响应。例如,Rührmair所描述的超高信息含量(SHIC)PUF(“Applications of High-CapacityCrossbar Memories in Cryptography”,IEEE Trans.Nanotechnol.,卷10,第3:489-498,2011)可被视为强PUF。
·受控PUF满足了强PUF的所有标准,并且另外地实现了能够计算更先进功能以通过密码学增强协议的辅助控制单元。
PUF输出是有噪声的,因为尽管评估相同的输出其会略微变化。这通常是利用模糊提取来解决的,模糊提取是一种开发用来消除生物计量测量值的噪声的方法。(参见Juels等人,“A Fuzzy Commitment Scheme”,Proceedings of the 6th ACM conference onComputer and Communications Security,CCS’99,第28-36页,ACM,1999)。模糊提取可以部分地用在具有PUF的设备内,例如用在辅助控制单元内,使得输出对于固定输入是恒定的。模糊提取(或者逆模糊提取)可以例如采用“安全略图”,如Juels等人所说明的,以存储待重构的敏感值V和用于恢复V的帮助字符串P。输入字符串O的安全略图SS可以例如定义为其中ECC是能够校正t个误差的长度为n的二进制(n,k,2t+1)误差纠正码并且V←{0,1}k是k位值。利用误差纠正码ECC和O’的译码方案D,给定在O的最大Hamming距离内的帮助字符串P和输入O’,原始值V则可以再现为
2、不可预测性:期望的是对于大于可忽略概率的挑战c对手不能预测设备的PUF响应(至少在不对设备进行物理访问的情况下),并且该帮助数据不会向对手透露有关PUF响应的任何信息。假定所有实体被约束于概率多项式时间(PPT),即,仅能关于全局安全参数λ(其是指相应参数中的位数)高效地执行在多项式上需要很多操作的计算,则表示对手猜测PUF P对挑战c的正确响应r的概率,优选地在k2上可忽略。这可以例如通过对手与PUF设备P之间的、将来自长度为k1的挑战空间的输入字符串映射到长度为k2的响应空间的游戏:来评估,其中是λ协议的安全参数,一元地给定为1λ。
PUF-PRED:PUF预测游戏
游戏如下进行:
仅当猜测r’等于P对的所提交的挑战c的实际响应r←P(c)时,对手才赢得游戏。(如所提到的,PUF的输出有噪声且将对于任何固定输入略微变化,因此相等通常是关于模糊提取器的输出来考虑的(例如,Dodis等人,“Fuzzy Extractors:How to GenerateStrong Keys from Biometrics and Other Noisy Data”,SIAM J.Comput,卷38,no.1:97-139,2008))。
4、不可区分性:PUF设备的输出(典型地是模拟提取器的输出)优选地在计算上不能区分于相同长度的随机字符串,使得PPT对手的优点至多可忽略地大于PUF的不可区分性可以通过例如这样的游戏来评估“请对手区分用于PUF P的模糊提取器的输出r与相同长度的随机选择的字符串
PUF-IND:PUF不可区分性游戏
该游戏如下进行:
8、对于所有的请求c′i≠c,PUF设备返回集合{r′i|r′i←P(c′i)}。
9、对手输出猜测位b’,并且当b’=b时成功。
PUF的相关评估是由如下文献给出:Hori等人,“Quantitative and StatisticalPerformance Evaluation of Arbiter Physical Unclonable Fuctions on FPGA”,2010International Conference on Reconfigurable Computing and FPGA(ReConFig),第298-303页,2010;Maiti,A Systematic Approach to Design an Eficient PhysicalUnclonable Function,dissertation,Virginia Tech,2012,以及其它。
各种认证方案使用知识的零知识证据,这是一种假设给定的陈述为真,同时不透露任何超越该事实的内容。零知识证据是两方之间的交互:希望确立陈述的有效性的证明者以及必须确信陈述为真的验证者必须以真的陈述实际上为真的压倒性概率使验证者确信。利用知识的零知识证据,验证者不会使用来自先前证据的消息来使新的一方确信陈述的有效性,并且消息仅透露了单位信息:证明者是否具有秘密。有两种普通类的零知识证据:交互式零知识证据,其中一系列消息在证明者与验证者之间交换,以及非交互式零知识证据,其中证明者传达单一消息而不与交互,而使确信具有秘密。许多(交互式)零知识证据系统要求多次迭代来确立陈述的有效性。也即,每次交互可以以某概率成功,即使证明者不具有秘密(或陈述为假)。因此,如果当陈述为假时成功的概率是p,则协议运行n次,直至1-(p)n充分接近1。
发明内容
根据本发明的实施方案的认证系统利于两个端点标识的确立,以及利用两个终端设备(可能在单独的局域网上)之间的动态生成的密钥的安全通信通道。交互式或非交互式认证协议用于确立目标终端设备的标识,并且动态密钥生成用于确立用来创建终端设备之间的加密通信通道的共享的对称会话密钥。在一个实施方案中,共享的对称会话密钥则会如所期望地更新,并且在新动态生成的密钥下加密。
附图说明
图1是示出在本发明的实施方案中设备之间的动态密钥生成的示意图。
具体实施方式
本详细说明基于使用密码学椭圆曲线(包括相关联的术语和协约)的实施方案的实施例,但是本文发明构思和教导同样适用于其它各种密码学方案,诸如采用比如离散对数或因数化的不同问题的方案。同样,本发明不受可能利用或借助本发明所采用的本文所述的各种附加特征限制。
为了构造设备的本质标识,生成设备的标识的公共表示(此处称为注册记号或公共密钥)。可以使用椭圆曲线数学架构,但是本领域技术人员将认识到,其它架构(例如,离散对数架构,在这方面美国专利第8,918,647号通过引用并入此处)将提供相同的功能。响应于服务器的挑战查询(或多个查询),从每个PUF设备d收集密码学注册记号(或一系列记号){(cd,Pd,Ad mod p)}。每个设备从空间{0,1}λ随机地均匀地选择私有密钥其中λ是安全参数(例如,模量p中的位数)并且计算作为设备的公共密钥,其中G是在中椭圆曲线上的阶q的基点。优选地,没有敏感信息在通信通道上传输或者存储在非易失性存储器中(例如,设备可以在生成Ad后丢弃)。当需要来认证设备时,注册记号(cd,Pd,Ad mod p)允许设备d再生成并且完成证据。算法1以伪码描述了示范性的注册协议。
(注册过程优选地应当仅需要一次,并且优选地应当确保在安全违背的情形下设备能够通过服务器侧的微小变化而保持活跃,而无需再注册。如在通过引用方式合并于本文的美国专利第8,918,647中所描述的,可构造挑战-响应树,其中仅根节点直接从PUF响应得到,所得到的记号从注册期间收集的那些中生成)。
PUF使能的设备可以优选地在本地存储和取回敏感值,而不将任何敏感信息存储在非易失性存储器中。算法2示出了了使用PUF存储敏感值(例如,),并且算法3示出了敏感值的再生成。设备d的挑战cd和帮助数据helperd可以是公共的,因为任何一者均没有透露任何有关敏感值的内容。虽然本实施例使用了利用异或对敏感值加密,可替代地,该值可以例如用于形成其它加密算法(例如,AES)的密钥来使能任意大小的值的存储和取回。
每当O和O′是t接近时,错误校正码ECC可以传递到译码算法D来恢复敏感值。
认证阶段允许服务器验证客户端设备经认证而发布请求。在椭圆曲线实施方案中,在接收到来自设备的请求时,服务器可以构造Chaum等人(“An Improved Protocol forDemonstrating Possession of Discrete Logarithms and some Generalizations”,Proceedings of the 6th annual international conference on Theory andapplication of cryptographic techniques,EUROCRYPT’87,第127-141页,Springer,1988)的与设备d的零知识证据协议椭圆曲线变体以确立执行请求的许可,如算法4所示的。
对交互式零知识证据中来自验证终端设备的通信的要求是获得特定于当前证据的当前值。这防止了偷听的对手使用来自有效设备的先前证据来成功地完成认证协议且伪装为终端设备。
非交互式零知识证据去除了该通信要求,并且允许证据在不与验证端点交互的情况下完成。算法4的非交互式构造要求设备以防止证明终端设备操纵证据的方式代表验证者生成当前。作为一个实施例,证明终端设备可以构造当前N为其中H是哈希函数,τ是时间戳,x|y表示x和y的级联。时间戳确保通过证明终端设备构造的先前证据未来不会被对手重播,而哈希函数确保证明终端设备不能以对手的方式操纵挑战。时间戳优选地无需在到达证明者时匹配当前的时间戳,验证端点反而校验时间戳合理地是当前的(例如,第二粒度级)并且单调地增加以防止重播攻击。算法5提供了非交互式认证协议。
可以采用非交互式认证从而提供零知识中的第一分组认证。例如,通过证明终端设备发送的第一分组可以包含以下认证记号,其足以使得验证终端设备确立证明的终端设备的标识:认证是第一分组,因为在构造认证记号之前,与接收(验证)终端设备的任何通信都是不必要的。此外,发送(证明)终端设备的验证在不与发送(证明)终端设备通信的情况下完成。观察到分组auth的偷听对手将不能重播分组,因为时间戳τ不再是当前的。算法6示出了设备到设备第一分组相互认证。
两个通信设备能够如所期望地(即,动态地)利用算法6(再)认证并且同时通过发送包括认证记号和新会话密钥的auth-update消息来确立新会话密钥。参考图1,例如,如果设备D1希望向设备D5证明第一分组上的标识,则同时与设备D5确立新的会话密钥,auth-update分组则是
该设备的一个实施方案可以包括配备有例如215,000个逻辑单元、13兆字节的块随机存取存储器以及700个数字信号处理(DSP)片的Xilinx Artix 7现场可编程门阵列(FPGA)平台。在采用例如椭圆曲线密码学的实施方案中,硬件数学引擎可以被例示在板上DSP片中,PUF构造位于逻辑单元内,并且逻辑处理核包括到PUF的输入和输出并且构造为控制那些以及该设备的外部输入和输出并且执行算法(发送椭圆曲线和其它数学计算到数学引擎),如上文所描述的那些。如此构造的设备(图1中的D1-D8)随后可以连接(例如,经由网络)并且执行非交互式相互认证和动态密钥生成。若干其它物理实施方案是显而易见的,诸如在较大的集成电路上使用涂层PUF,等等。
在另一实施方案中,目标终端设备的新的“公共密钥”可以生成,而无需与目标终端设备通信来对新的随机会话密钥加密,新的随机会话密钥加密将取代当前的会话密钥。新的公共密钥可以利用如在该方面通过引用方式并入的美国专利第8,918,647中所描述的取得的记号如所期望的那样来生成。
本领域技术人员将认识到,示范性的特征和算法的其它组合和改动可以用于不同的应用,并且设备的硬件标识的使用可应用于不受所提供的实施例的零知识方面所限制的各种密码学认证技术。例如,希望与系统通信的设备可以初始地执行认证,诸如根据算法5来在第一分组中认证系统并且系统随后可以利用设备执行动态会话密钥确立协议(通过auth-update消息)以开始安全通信通道。此外,认证协议无需限于零知识,并且可以基于用于确立标识的其它密码学构造。例如,服务器可以向设备发送挑战消息,设备利用其硬件标识(例如使用由设备PUF再生成的私有密钥和标准签名算法)对该挑战消息进行数字签名并且在返回服务器的分组报头(例如,TCP选项报头(TCP Options Header)包括该签名。在接收到时,服务器利用设备的公共密钥验证其挑战上的数字签名是有效的。
Claims (15)
1.安全通信设备,包括:
a.通信输入和通信输出;
b.硬件标识模块,其包括所述设备独有的硬件固有标识;以及
c.逻辑处理器,其与所述通信输入和通信输出连接且与所述硬件标识模块连接;
其中所述安全通信设备被配置为通过经由所述通信输出向期望的接收设备发送包含零知识证据认证令牌的第一分组来执行非交互式认证,所述零知识证据认证令牌是针对所述安全通信设备的公共密钥可验证的且基于所述安全通信设备的所述硬件固有标识,并且其中所述安全通信设备被进一步配置为生成加密的会话密钥且在所述第一分组中包括所述加密的会话密钥。
2.如权利要求1所述的安全通信设备,其中所述安全通信设备被进一步配置为利用非对称加密和所述期望接收设备的公共密钥对包含在所述第一分组中的会话密钥加密。
3.如权利要求1所述的安全通信设备,其中所述安全通信设备被进一步配置为在所述第一分组中包括所述安全通信设备对所述会话密钥的加密签名。
4.如权利要求2所述的安全通信设备,其中所述安全通信设备被进一步配置为在所述第一分组中包括所述安全通信设备对所述会话密钥的加密签名。
5.如权利要求1、2、3或4所述的安全通信设备,其中所述认证令牌基于时间戳。
6.如权利要求1、2、3或4所述的安全通信设备,其中所述安全通信设备被配置为发送包括基于所述安全通信设备的硬件固有标识的认证令牌且包括新会话密钥的认证更新分组。
7.如权利要求1、2、3或4所述的安全通信设备,其中所述安全通信设备还包括数学引擎。
8.如权利要求7所述的安全通信设备,其中所述安全通信设备被配置为执行椭圆曲线密码学,并且所述数学引擎被配置为执行椭圆曲线计算。
9.如权利要求1、2、3或4所述的安全通信设备,其中所述安全通信设备被进一步配置为发送包含更新后的公共密钥的认证更新分组。
10.如权利要求1、2、3或4所述的安全通信设备,其中所述硬件标识模块是物理不可克隆函数。
11.如权利要求5所述的安全通信设备,其中所述硬件标识模块是物理不可克隆函数。
12.如权利要求6所述的安全通信设备,其中所述硬件标识模块是物理不可克隆函数。
13.如权利要求7所述的安全通信设备,其中所述硬件标识模块是物理不可克隆函数。
14.如权利要求8所述的安全通信设备,其中所述硬件标识模块是物理不可克隆函数。
15.如权利要求9所述的安全通信设备,其中所述硬件标识模块是物理不可克隆函数。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201462001979P | 2014-05-22 | 2014-05-22 | |
US62/001,979 | 2014-05-22 | ||
PCT/US2015/032320 WO2015179849A2 (en) | 2014-05-22 | 2015-05-22 | Network authentication system with dynamic key generation |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106797313A CN106797313A (zh) | 2017-05-31 |
CN106797313B true CN106797313B (zh) | 2020-09-15 |
Family
ID=54554985
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201580027307.3A Active CN106797313B (zh) | 2014-05-22 | 2015-05-22 | 利用动态密钥生成的网络认证系统 |
Country Status (5)
Country | Link |
---|---|
US (1) | US10382962B2 (zh) |
EP (1) | EP3146670B8 (zh) |
JP (1) | JP6622795B2 (zh) |
CN (1) | CN106797313B (zh) |
WO (1) | WO2015179849A2 (zh) |
Families Citing this family (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101243513A (zh) * | 2005-08-23 | 2008-08-13 | 皇家飞利浦电子股份有限公司 | 使用物理单向函数的信息载体鉴别 |
US20150134966A1 (en) | 2013-11-10 | 2015-05-14 | Sypris Electronics, Llc | Authentication System |
US10432409B2 (en) | 2014-05-05 | 2019-10-01 | Analog Devices, Inc. | Authentication system and device including physical unclonable function and threshold cryptography |
US9672342B2 (en) | 2014-05-05 | 2017-06-06 | Analog Devices, Inc. | System and device binding metadata with hardware intrinsic properties |
US9946858B2 (en) | 2014-05-05 | 2018-04-17 | Analog Devices, Inc. | Authentication system and device including physical unclonable function and threshold cryptography |
US10547460B2 (en) * | 2016-11-18 | 2020-01-28 | Qualcomm Incorporated | Message-based key generation using physical unclonable function (PUF) |
US11310062B2 (en) * | 2017-03-31 | 2022-04-19 | Arizona Board Of Regents On Behalf Of Northern Arizona University | Securing physically unclonable functions with additional random ternary states |
CN108733311B (zh) * | 2017-04-17 | 2021-09-10 | 伊姆西Ip控股有限责任公司 | 用于管理存储系统的方法和设备 |
US10425235B2 (en) | 2017-06-02 | 2019-09-24 | Analog Devices, Inc. | Device and system with global tamper resistance |
US10958452B2 (en) | 2017-06-06 | 2021-03-23 | Analog Devices, Inc. | System and device including reconfigurable physical unclonable functions and threshold cryptography |
EP3711255A1 (en) * | 2017-11-23 | 2020-09-23 | Huawei Technologies Co., Ltd. | Device, system and method for secure data communication |
US11050574B2 (en) * | 2017-11-29 | 2021-06-29 | Taiwan Semiconductor Manufacturing Company, Ltd. | Authentication based on physically unclonable functions |
EP3769466A1 (en) * | 2018-03-23 | 2021-01-27 | Nchain Holdings Limited | Computer-implemented system and method for enabling zero-knowledge proof |
EP3815300A4 (en) * | 2018-06-27 | 2022-03-23 | Unm Rainforest Innovations | ROBUST AUTHENTICATION TECHNIQUE BASED ON CORRELATION USING ONLY AUXILIARY DATA |
CN109104410B (zh) * | 2018-07-12 | 2021-01-01 | 湖北工业大学 | 一种信息的匹配方法及装置 |
US11379263B2 (en) * | 2018-08-13 | 2022-07-05 | Ares Technologies, Inc. | Systems, devices, and methods for selecting a distributed framework |
US11316692B2 (en) * | 2018-08-13 | 2022-04-26 | Ares Technologies, Inc. | Systems, devices, and methods for selecting a distributed framework |
US11271759B2 (en) * | 2018-09-05 | 2022-03-08 | Arizona Board Of Regents On Behalf Of Northern Arizona University | Secure digital signatures using physical unclonable function devices with reduced error rates |
US10999082B2 (en) | 2018-09-28 | 2021-05-04 | Analog Devices, Inc. | Localized garbled circuit device |
AT522608A1 (de) * | 2019-05-16 | 2020-12-15 | Evva Sicherheitstechnologie | Verfahren zum Betreiben eines Zutrittskontrollsystems sowie Zutrittskontrollsystem |
CN110120874B (zh) * | 2019-05-28 | 2021-04-20 | 湖南大学 | 基于物理不可克隆函数的轻量级密钥共享方法 |
CN110519052B (zh) * | 2019-08-23 | 2022-07-05 | 青岛海尔科技有限公司 | 基于物联网操作系统的数据交互方法和装置 |
CN111224783B (zh) * | 2019-11-26 | 2021-07-23 | 复旦大学 | 一种支持密钥刷新的两方椭圆曲线数字签名方法 |
CN113765856B (zh) * | 2020-06-04 | 2023-09-08 | 中移(成都)信息通信科技有限公司 | 身份认证方法、装置、设备和介质 |
US11804971B2 (en) | 2020-08-05 | 2023-10-31 | Analog Devices, Inc. | Correcting physical unclonable function errors based on short integers solutions to lattice problems |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030048173A1 (en) * | 2001-09-06 | 2003-03-13 | Satoshi Shigematsu | Authentication method, authentication system, and authentication token |
CN101411117A (zh) * | 2006-05-21 | 2009-04-15 | 国际商业机器公司 | 断言消息签名 |
US20100122093A1 (en) * | 2005-07-07 | 2010-05-13 | Koninklijke Philips Electronics N.V. | Method, apparatus and system for verifying authenticity of an object |
Family Cites Families (55)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2948294B2 (ja) * | 1990-09-20 | 1999-09-13 | 松下電器産業株式会社 | 認証機能付き鍵配送システムにおける端末 |
US20030004817A1 (en) * | 2001-06-27 | 2003-01-02 | Conoco Inc | Visual database for linking geography to seismic data |
US8346951B2 (en) | 2002-03-05 | 2013-01-01 | Blackridge Technology Holdings, Inc. | Method for first packet authentication |
US7245718B2 (en) | 2003-08-26 | 2007-07-17 | Mitsubishi Electric Research Laboratories, Inc. | Low bandwidth zero knowledge authentication protocol and device |
US20050222896A1 (en) | 2003-09-19 | 2005-10-06 | Rhyne Joseph C | Systems, methods, and software for leveraging informational assets across multiple business units |
KR20060113685A (ko) | 2003-10-29 | 2006-11-02 | 코닌클리케 필립스 일렉트로닉스 엔.브이. | 물리적 랜덤 함수들을 함께 공유하는 신뢰성 있는 포워드비밀 키의 시스템 및 방법 |
US20050149496A1 (en) | 2003-12-22 | 2005-07-07 | Verity, Inc. | System and method for dynamic context-sensitive federated search of multiple information repositories |
US7549048B2 (en) * | 2004-03-19 | 2009-06-16 | Microsoft Corporation | Efficient and secure authentication of computing systems |
US7581248B2 (en) | 2004-06-28 | 2009-08-25 | International Business Machines Corporation | Federated identity brokering |
US7702927B2 (en) | 2004-11-12 | 2010-04-20 | Verayo, Inc. | Securely field configurable device |
WO2006130725A2 (en) * | 2005-05-31 | 2006-12-07 | Interdigital Technology Corporation | Authentication and encryption methods using shared secret randomness in a joint channel |
JP2009508430A (ja) | 2005-09-14 | 2009-02-26 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | 品目の真正性を判定するデバイス、システム及び方法 |
WO2007063473A1 (en) | 2005-11-29 | 2007-06-07 | Koninklijke Philips Electronics N.V. | Physical secret sharing and proofs of vicinity using pufs |
US7926089B2 (en) | 2006-07-14 | 2011-04-12 | Hewlett-Packard Development Company, L.P. | Router for managing trust relationships |
US8787566B2 (en) | 2006-08-23 | 2014-07-22 | Red Hat, Inc. | Strong encryption |
JP4345794B2 (ja) * | 2006-09-28 | 2009-10-14 | ソニー株式会社 | 固体撮像素子の製造方法 |
US8510608B2 (en) | 2006-11-06 | 2013-08-13 | Panasonic Corporation | Generating PUF error correcting code using redundant hardware |
US20080256549A1 (en) | 2007-04-10 | 2008-10-16 | International Business Machines Corporation | System and Method of Planning for Cooperative Information Processing |
US8463813B2 (en) | 2007-04-12 | 2013-06-11 | Younite, Inc. | Individualized data sharing |
US8290150B2 (en) | 2007-05-11 | 2012-10-16 | Validity Sensors, Inc. | Method and system for electronically securing an electronic device using physically unclonable functions |
US20110215829A1 (en) | 2007-08-22 | 2011-09-08 | Intrinsic Id B.V. | Identification of devices using physically unclonable functions |
US20090063860A1 (en) * | 2007-08-31 | 2009-03-05 | Albert Tyler Barnett | Printer driver that encrypts print data |
CN101542496B (zh) * | 2007-09-19 | 2012-09-05 | 美国威诚股份有限公司 | 利用物理不可克隆功能的身份验证 |
US7962516B2 (en) | 2008-02-05 | 2011-06-14 | International Business Machines Corporation | System and method for adding multi-level security to federated asset repositories |
KR20090104421A (ko) | 2008-03-31 | 2009-10-06 | 고려대학교 산학협력단 | 무선센서네트워크에서의 타원곡선암호 기반 키 설정 방법과이를 이용한 무선센서네트워크 시스템 및 기록매체 |
CN102077205B (zh) | 2008-06-27 | 2015-12-16 | 皇家飞利浦电子股份有限公司 | 用于检验物品的真实性、完整性和/或物理状态的设备、系统和方法 |
TWI498827B (zh) | 2008-11-21 | 2015-09-01 | Verayo Inc | 非連網射頻辨識裝置物理不可複製功能之鑑認技術 |
JP5101535B2 (ja) * | 2009-01-19 | 2012-12-19 | 日本電信電話株式会社 | 認証方法、認証システム、プログラムおよび共有鍵生成方法 |
US8555069B2 (en) * | 2009-03-06 | 2013-10-08 | Microsoft Corporation | Fast-reconnection of negotiable authentication network clients |
JP5548218B2 (ja) | 2009-03-06 | 2014-07-16 | イントリンシツク・イー・デー・ベー・ベー | 物理的システムに依存する暗号鍵を確立するためのシステム |
EP2230794A3 (en) | 2009-03-16 | 2011-10-05 | Technische Universität München | Towards Electrical, Integrated Implementations of SIMPL Systems |
US8379856B2 (en) | 2009-06-17 | 2013-02-19 | Empire Technology Development Llc | Hardware based cryptography |
US8811615B2 (en) | 2009-08-05 | 2014-08-19 | Verayo, Inc. | Index-based coding with a pseudo-random source |
US8468186B2 (en) | 2009-08-05 | 2013-06-18 | Verayo, Inc. | Combination of values from a pseudo-random source |
KR101452713B1 (ko) * | 2009-10-30 | 2014-10-21 | 삼성전자주식회사 | 픽처 경계의 부호화 단위를 부호화, 복호화 하는 방법 및 장치 |
US20130051552A1 (en) * | 2010-01-20 | 2013-02-28 | Héléna Handschuh | Device and method for obtaining a cryptographic key |
US20120072717A1 (en) | 2010-02-01 | 2012-03-22 | Hayes John W | Dynamic identity authentication system |
US8281127B2 (en) | 2010-02-01 | 2012-10-02 | Blackridge Technology Holdings, Inc. | Method for digital identity authentication |
US8458489B2 (en) | 2010-03-25 | 2013-06-04 | Empire Technology Development Llc | Differential uncloneable variability-based cryptography |
US20110299678A1 (en) | 2010-06-07 | 2011-12-08 | Alexander Roger Deas | Secure means for generating a specific key from unrelated parameters |
US8848905B1 (en) | 2010-07-28 | 2014-09-30 | Sandia Corporation | Deterrence of device counterfeiting, cloning, and subversion by substitution using hardware fingerprinting |
US8667265B1 (en) * | 2010-07-28 | 2014-03-04 | Sandia Corporation | Hardware device binding and mutual authentication |
US8516269B1 (en) | 2010-07-28 | 2013-08-20 | Sandia Corporation | Hardware device to physical structure binding and authentication |
US20120137137A1 (en) | 2010-11-30 | 2012-05-31 | Brickell Ernest F | Method and apparatus for key provisioning of hardware devices |
US8418006B1 (en) | 2010-12-07 | 2013-04-09 | Xilinx, Inc. | Protecting a design for an integrated circuit using a unique identifier |
US8386990B1 (en) | 2010-12-07 | 2013-02-26 | Xilinx, Inc. | Unique identifier derived from an intrinsic characteristic of an integrated circuit |
US20120183135A1 (en) | 2011-01-19 | 2012-07-19 | Verayo, Inc. | Reliable puf value generation by pattern matching |
US8566579B2 (en) | 2011-03-15 | 2013-10-22 | Sandia Corporation | Obfuscated authentication systems, devices, and methods |
US8643244B2 (en) * | 2011-07-25 | 2014-02-04 | Hamilton Sundstrand Corporation | Strength cast rotor for an induction motor |
US9547761B2 (en) * | 2012-04-09 | 2017-01-17 | Mcafee, Inc. | Wireless token device |
US8525169B1 (en) | 2012-08-10 | 2013-09-03 | International Business Machines Corporation | Reliable physical unclonable function for device authentication |
US20150008240A1 (en) * | 2013-07-08 | 2015-01-08 | Douglas Mark Davis | Refillable Lotion Back Applicator |
US9489501B2 (en) * | 2013-09-19 | 2016-11-08 | Fujitsu Limited | Authentication method, authentication device, and system |
US20150134966A1 (en) | 2013-11-10 | 2015-05-14 | Sypris Electronics, Llc | Authentication System |
US9628272B2 (en) | 2014-01-03 | 2017-04-18 | William Marsh Rice University | PUF authentication and key-exchange by substring matching |
-
2015
- 2015-05-22 JP JP2017514397A patent/JP6622795B2/ja active Active
- 2015-05-22 CN CN201580027307.3A patent/CN106797313B/zh active Active
- 2015-05-22 WO PCT/US2015/032320 patent/WO2015179849A2/en active Application Filing
- 2015-05-22 US US14/720,636 patent/US10382962B2/en active Active
- 2015-05-22 EP EP15795660.8A patent/EP3146670B8/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030048173A1 (en) * | 2001-09-06 | 2003-03-13 | Satoshi Shigematsu | Authentication method, authentication system, and authentication token |
US20100122093A1 (en) * | 2005-07-07 | 2010-05-13 | Koninklijke Philips Electronics N.V. | Method, apparatus and system for verifying authenticity of an object |
CN101411117A (zh) * | 2006-05-21 | 2009-04-15 | 国际商业机器公司 | 断言消息签名 |
Non-Patent Citations (2)
Title |
---|
Efficient deniable authentication protocol based on generalized ElGamal signature scheme;SHAO, Zuhua;《Computer Standards & Interfaces》;20031104;489-454 * |
一种基于椭圆曲线离散对数问题的非交互式认证协议;邵飞等;《小型微型计算机系统》;20140131;第35卷(第1期);89-92 * |
Also Published As
Publication number | Publication date |
---|---|
EP3146670B1 (en) | 2021-08-18 |
JP6622795B2 (ja) | 2019-12-18 |
EP3146670A4 (en) | 2018-01-17 |
EP3146670B8 (en) | 2021-09-22 |
US20150341792A1 (en) | 2015-11-26 |
US10382962B2 (en) | 2019-08-13 |
WO2015179849A3 (en) | 2016-01-14 |
WO2015179849A2 (en) | 2015-11-26 |
CN106797313A (zh) | 2017-05-31 |
EP3146670A2 (en) | 2017-03-29 |
JP2017517229A (ja) | 2017-06-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106797313B (zh) | 利用动态密钥生成的网络认证系统 | |
US10931467B2 (en) | Authentication system and device including physical unclonable function and threshold cryptography | |
Wallrabenstein | Practical and secure IoT device authentication using physical unclonable functions | |
US10013543B2 (en) | System and device binding metadata with hardware intrinsic properties | |
US9998445B2 (en) | Authentication system | |
US9806718B2 (en) | Authenticatable device with reconfigurable physical unclonable functions | |
US9946858B2 (en) | Authentication system and device including physical unclonable function and threshold cryptography | |
CN106576046B (zh) | 将元数据与硬件固有属性绑定的系统和设备 | |
CN107615285B (zh) | 包括物理不可克隆功能和阈值加密的认证系统和装置 | |
Dwivedi et al. | A fingerprint based crypto-biometric system for secure communication | |
JP2014523192A (ja) | デバイス及びサーバの通信におけるファジーな認証情報を用いた暗号化によるセキュリティ | |
Zhao et al. | ePUF: A lightweight double identity verification in IoT | |
Bouchaala et al. | Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card | |
JP2017524306A (ja) | 暗号化操作における悪意のある変更に対する保護 | |
Braeken | PUF‐Based Authentication and Key Exchange for Internet of Things | |
Byun | A generic multifactor authenticated key exchange with physical unclonable function | |
Byun | Research Article A Generic Multifactor Authenticated Key Exchange with Physical Unclonable Function | |
Delfs et al. | Cryptographic protocols |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |