CN106797313B - 利用动态密钥生成的网络认证系统 - Google Patents

利用动态密钥生成的网络认证系统 Download PDF

Info

Publication number
CN106797313B
CN106797313B CN201580027307.3A CN201580027307A CN106797313B CN 106797313 B CN106797313 B CN 106797313B CN 201580027307 A CN201580027307 A CN 201580027307A CN 106797313 B CN106797313 B CN 106797313B
Authority
CN
China
Prior art keywords
communications device
secure communications
secure
identification module
packet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201580027307.3A
Other languages
English (en)
Other versions
CN106797313A (zh
Inventor
J·沃尔什
J·R·瓦尔拉本斯泰因
C·蒂姆科
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cypress Electronics Co ltd
Original Assignee
Cypress Electronics Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cypress Electronics Co ltd filed Critical Cypress Electronics Co ltd
Publication of CN106797313A publication Critical patent/CN106797313A/zh
Application granted granted Critical
Publication of CN106797313B publication Critical patent/CN106797313B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3278Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks

Abstract

具有动态密码生成的网络认证系统利于确立两个端点标识,以及使用两个终端设备(可能在单独的局域网上)之间动态生成的密钥的安全通信通道。交互式或非交互式认证协议用于确立目标终端设备的标识,并且动态密钥生成用于确立用于创建终端设备之间的加密通信通道的共享对称会话密钥。

Description

利用动态密钥生成的网络认证系统
技术领域
本公开一般地涉及网络认证,尤其而非排他地涉及通过代换来防护篡改和破坏的认证。
相关申请的交叉引用
本申请要求2014年5月22日提交的美国临时专利申请序号62/001,979的优先权的利益且该申请通过引用方式并入。
背景技术
在线通信的主要的方面是两个端点基于它们各自的标识来建立认证通道的能力。对此的一种解决方案采用公共密钥基础设施(PKI),其中公共密钥允许终端设备被合理地确信它们仅相互通信。然而,在该方案中,端点及其标识通常是独立的,即,任意标识生成且分配给端点。
在各种设备认证方案中,物理不可克隆函数(PUF)已经被使用,使得每个设备具有本质上与该设备链接的唯一标识。Rührmair等人(“Modeling Attacks on PhysicalUnclonable Functions”,Proceedings of the 17th ACM conference on Computer andcommunications security,CCS’10,第237-249页,ACM,2010)限定了三个不同类的PUF设备:
·弱PUF通常仅用于取得私密密钥。挑战空间会受限制,并且假设响应空间永不显露。典型的构造包括SRAM(Holcomb等人,“Initial SRAM State as a Fingerprint andSource of True Random Numbers for RFID Tags”,In Proceedings of the Conferenceon RFID Security,2007),Butterfly(Kumar等人,“Extended abstract:The ButterflyPUF Protecting IP on Every FPGA”,IEEE International Workshop on Hardware-Oriented Security and Trust,第67-70页,2008),Arbiter(Lee等人,“A technique tobuild a secret key in integrated circuits for identification andauthentication applications,”,IEEE Symposium on VLSI Circuits:Digest ofTechnical Papers,第176-179页,2004),Ring Oscillator(Suh等人,“PhysicalUnclonable Functions for Device Authentication and Secret Key Generation”,Proceedings of the 44th annual Design Automation Conference,DAC’07,第9-14页,ACM,2007),以及Coating(Tuyls等人,“Read-Proof Hardware from ProtectiveCoatings”,Proceedings of the 8th international conference on CryptographicHardware and Embedded Systems,CHES’06,第369-383页,Springer,2006)PUF。
·强PUF假设:(i)物理上不可能克隆,(ii)不可能在合理的时间内收集挑战响应对的完整集合(典型地花费数周的数量级的时间),以及(iii)难以预测对随机挑战的响应。例如,Rührmair所描述的超高信息含量(SHIC)PUF(“Applications of High-CapacityCrossbar Memories in Cryptography”,IEEE Trans.Nanotechnol.,卷10,第3:489-498,2011)可被视为强PUF。
·受控PUF满足了强PUF的所有标准,并且另外地实现了能够计算更先进功能以通过密码学增强协议的辅助控制单元。
PUF输出是有噪声的,因为尽管评估相同的输出其会略微变化。这通常是利用模糊提取来解决的,模糊提取是一种开发用来消除生物计量测量值的噪声的方法。(参见Juels等人,“A Fuzzy Commitment Scheme”,Proceedings of the 6th ACM conference onComputer and Communications Security,CCS’99,第28-36页,ACM,1999)。模糊提取可以部分地用在具有PUF的设备内,例如用在辅助控制单元内,使得输出对于固定输入是恒定的。模糊提取(或者逆模糊提取)可以例如采用“安全略图”,如Juels等人所说明的,以存储待重构的敏感值V和用于恢复V的帮助字符串P。输入字符串O的安全略图SS可以例如定义为
Figure BDA0001158675750000021
其中ECC是能够校正t个误差的长度为n的二进制(n,k,2t+1)误差纠正码并且V←{0,1}k是k位值。利用误差纠正码ECC和O’的译码方案D,给定在O的最大Hamming距离内的帮助字符串P和输入O’,原始值V则可以再现为
Figure BDA0001158675750000031
绑定到设备d的物理不可克隆函数
Figure BDA0001158675750000038
优选地呈现出以下特性:
1、不可克隆性:
Figure BDA0001158675750000039
利用克隆PUF P’来复制PUF P而使得其输出分布t统计接近的概率小于某足够小的∈1
2、不可预测性:期望的是对于大于可忽略概率的挑战c对手不能预测设备的PUF响应(至少在不对设备进行物理访问的情况下),并且该帮助数据不会向对手透露有关PUF响应的任何信息。假定所有实体被约束于概率多项式时间(PPT),即,仅能关于全局安全参数λ(其是指相应参数中的位数)高效地执行在多项式上需要很多操作的计算,则
Figure BDA0001158675750000032
表示对手
Figure BDA0001158675750000033
猜测PUF P对挑战c的正确响应r的概率,优选地在k2上可忽略。这可以例如通过对手
Figure BDA0001158675750000034
与PUF设备P之间的、将来自长度为k1的挑战空间
Figure BDA0001158675750000035
的输入字符串映射到长度为k2的响应空间
Figure BDA0001158675750000036
的游戏:
Figure BDA00011586757500000310
来评估,其中是λ协议的安全参数,一元地给定为1λ
PUF-PRED:PUF预测游戏
Figure BDA0001158675750000037
Figure BDA0001158675750000041
游戏如下进行:
1、对手
Figure BDA0001158675750000042
以多项式发布多个(关于安全参数λ)挑战
Figure BDA0001158675750000043
到PUF设备P,其中
Figure BDA0001158675750000044
挑战集合是整个挑战空间
Figure BDA0001158675750000045
的正确子集。
2、PUF设备P返回响应{ri|ri←P(ci)}到
Figure BDA0001158675750000046
3、对手
Figure BDA0001158675750000047
最终输出不再挑战查询的原始集合
Figure BDA0001158675750000048
内的挑战c。不允许对手关于提交的挑战c查询PUF设备P。
4、对手
Figure BDA0001158675750000049
可能再次发布新的多项式形式的多挑战集合
Figure BDA00011586757500000410
到PUF设备P。不允许对手关于所提交的挑战c查询PUF设备P。
5、PUF设备P返回响应{r′i|r′i←P(c′i)}给
Figure BDA00011586757500000411
6、对手
Figure BDA00011586757500000412
最终输出P对所提交的挑战c的响应的猜测(guess)r’。
仅当猜测r’等于P对
Figure BDA00011586757500000413
的所提交的挑战c的实际响应r←P(c)时,对手才赢得游戏。(如所提到的,PUF的输出有噪声且将对于任何固定输入略微变化,因此相等通常是关于模糊提取器的输出来考虑的(例如,Dodis等人,“Fuzzy Extractors:How to GenerateStrong Keys from Biometrics and Other Noisy Data”,SIAM J.Comput,卷38,no.1:97-139,2008))。
3、鲁棒性:
Figure BDA00011586757500000414
即,固定PUFP对于相同的输入x产生响应t距离的概率小于某足够小的∈2
4、不可区分性:PUF设备的输出(典型地是模拟提取器的输出)优选地在计算上不能区分于相同长度
Figure BDA0001158675750000051
的随机字符串,使得PPT对手
Figure BDA0001158675750000052
的优点
Figure BDA0001158675750000053
至多可忽略地大于
Figure BDA0001158675750000054
PUF的不可区分性可以通过例如这样的游戏来评估“请对手
Figure BDA0001158675750000055
区分用于PUF P的模糊提取器的输出r与相同长度
Figure BDA0001158675750000056
的随机选择的字符串
Figure BDA0001158675750000057
PUF-IND:PUF不可区分性游戏
Figure BDA0001158675750000058
该游戏如下进行:
1、对手
Figure BDA0001158675750000059
对于任何挑战
Figure BDA00011586757500000510
执行注册阶段。
2、PUF设备从Gen的输出返回相应的帮助字符串Hi。将该挑战-帮助对(ci,Hi)的集合记为
Figure BDA00011586757500000511
3、对手
Figure BDA00011586757500000512
现在对于任何
Figure BDA00011586757500000513
请求PUF响应ri=P(ci)。将该步骤中的所请求的挑战的集合记为
Figure BDA0001158675750000061
4、对于所有请求
Figure BDA0001158675750000062
PUF设备返回集合{ri|ri←P(ci)}。
5、对手
Figure BDA0001158675750000063
选择挑战
Figure BDA0001158675750000064
使得对于c,
Figure BDA0001158675750000065
具有Hi,而不是Ri。PUF设备随机均匀地选择位b∈{0,1}。
6、如果b=0,则
Figure BDA0001158675750000066
被给定Ri=Rep(P(c)=ri,Hi)。否则,如果b=1,则
Figure BDA0001158675750000067
被给定随机字符串
Figure BDA0001158675750000068
7、允许对手
Figure BDA0001158675750000069
对于
Figure BDA00011586757500000610
查询PUF设备,只要不是c′i=c。
8、对于所有的请求c′i≠c,PUF设备返回集合{r′i|r′i←P(c′i)}。
9、对手输出猜测位b’,并且当b’=b时成功。
PUF的相关评估是由如下文献给出:Hori等人,“Quantitative and StatisticalPerformance Evaluation of Arbiter Physical Unclonable Fuctions on FPGA”,2010International Conference on Reconfigurable Computing and FPGA(ReConFig),第298-303页,2010;Maiti,A Systematic Approach to Design an Eficient PhysicalUnclonable Function,dissertation,Virginia Tech,2012,以及其它。
各种认证方案使用知识的零知识证据,这是一种假设给定的陈述为真,同时不透露任何超越该事实的内容。零知识证据是两方之间的交互:希望确立陈述的有效性的证明者
Figure BDA00011586757500000611
以及必须确信陈述为真的验证者
Figure BDA00011586757500000612
必须以真的陈述实际上为真的压倒性概率使验证者确信。利用知识的零知识证据,验证者不会使用来自先前证据的消息来使新的一方确信陈述的有效性,并且消息仅透露了单位信息:证明者
Figure BDA00011586757500000613
是否具有秘密。有两种普通类的零知识证据:交互式零知识证据,其中一系列消息在证明者
Figure BDA00011586757500000614
与验证者
Figure BDA00011586757500000615
之间交换,以及非交互式零知识证据,其中证明者
Figure BDA00011586757500000616
传达单一消息
Figure BDA00011586757500000617
而不与
Figure BDA00011586757500000618
交互,而使
Figure BDA00011586757500000619
确信
Figure BDA00011586757500000620
具有秘密。许多(交互式)零知识证据系统要求多次迭代来确立陈述的有效性。也即,每次交互可以以某概率成功,即使证明者不具有秘密(或陈述为假)。因此,如果当陈述为假时成功的概率是p,则协议运行n次,直至1-(p)n充分接近1。
发明内容
根据本发明的实施方案的认证系统利于两个端点标识的确立,以及利用两个终端设备(可能在单独的局域网上)之间的动态生成的密钥的安全通信通道。交互式或非交互式认证协议用于确立目标终端设备的标识,并且动态密钥生成用于确立用来创建终端设备之间的加密通信通道的共享的对称会话密钥。在一个实施方案中,共享的对称会话密钥则会如所期望地更新,并且在新动态生成的密钥下加密。
附图说明
图1是示出在本发明的实施方案中设备之间的动态密钥生成的示意图。
具体实施方式
本详细说明基于使用密码学椭圆曲线(包括相关联的术语和协约)的实施方案的实施例,但是本文发明构思和教导同样适用于其它各种密码学方案,诸如采用比如离散对数或因数化的不同问题的方案。同样,本发明不受可能利用或借助本发明所采用的本文所述的各种附加特征限制。
为了构造设备的本质标识,生成设备的标识的公共表示(此处称为注册记号或公共密钥)。可以使用椭圆曲线数学架构,但是本领域技术人员将认识到,其它架构(例如,离散对数架构,在这方面美国专利第8,918,647号通过引用并入此处)将提供相同的功能。响应于服务器的挑战查询(或多个查询),从每个PUF设备d收集密码学注册记号(或一系列记号){(cd,Pd,Ad mod p)}。每个设备从空间{0,1}λ随机地均匀地选择私有密钥
Figure BDA0001158675750000071
其中λ是安全参数(例如,模量p中的位数)并且计算
Figure BDA0001158675750000072
作为设备的公共密钥,其中G是在
Figure BDA0001158675750000073
中椭圆曲线上的阶q的基点。优选地,没有敏感信息在通信通道上传输或者存储在非易失性存储器中(例如,设备可以在生成Ad后丢弃
Figure BDA0001158675750000074
)。当需要
Figure BDA0001158675750000075
来认证设备时,注册记号(cd,Pd,Ad mod p)允许设备d再生成
Figure BDA0001158675750000076
并且完成证据。算法1以伪码描述了示范性的注册协议。
Figure BDA0001158675750000081
(注册过程优选地应当仅需要一次,并且优选地应当确保在安全违背的情形下设备能够通过服务器侧的微小变化而保持活跃,而无需再注册。如在通过引用方式合并于本文的美国专利第8,918,647中所描述的,可构造挑战-响应树,其中仅根节点直接从PUF响应得到,所得到的记号从注册期间收集的那些中生成)。
PUF使能的设备可以优选地在本地存储和取回敏感值,而不将任何敏感信息存储在非易失性存储器中。算法2示出了了使用PUF存储敏感值(例如,
Figure BDA0001158675750000082
),并且算法3示出了敏感值的再生成。设备d的挑战cd和帮助数据helperd可以是公共的,因为任何一者均没有透露任何有关敏感值的内容。虽然本实施例使用了利用异或
Figure BDA0001158675750000083
对敏感值加密,可替代地,该值可以例如用于形成其它加密算法(例如,AES)的密钥来使能任意大小的值的存储和取回。
Figure BDA0001158675750000091
Figure BDA0001158675750000092
每当O和O′是t接近时,错误校正码ECC可以传递到译码算法D来恢复敏感值。
认证阶段允许服务器验证客户端设备经认证而发布请求。在椭圆曲线实施方案中,在接收到来自设备的请求时,服务器可以构造Chaum等人(“An Improved Protocol forDemonstrating Possession of Discrete Logarithms and some Generalizations”,Proceedings of the 6th annual international conference on Theory andapplication of cryptographic techniques,EUROCRYPT’87,第127-141页,Springer,1988)的与设备d的零知识证据协议椭圆曲线变体以确立执行请求的许可,如算法4所示的。
Figure BDA0001158675750000101
对交互式零知识证据中来自验证终端设备的通信的要求是获得特定于当前证据的当前值。这防止了偷听的对手使用来自有效设备的先前证据来成功地完成认证协议且伪装为终端设备。
非交互式零知识证据去除了该通信要求,并且允许证据在不与验证端点交互的情况下完成。算法4的非交互式构造要求设备以防止证明终端设备操纵证据的方式代表验证者生成当前。作为一个实施例,证明终端设备可以构造当前N为
Figure BDA0001158675750000102
其中H是哈希函数,τ是时间戳,x|y表示x和y的级联。时间戳确保通过证明终端设备构造的先前证据未来不会被对手重播,而哈希函数确保证明终端设备不能以对手的方式操纵挑战。时间戳优选地无需在到达证明者时匹配当前的时间戳,验证端点反而校验时间戳合理地是当前的(例如,第二粒度级)并且单调地增加以防止重播攻击。算法5提供了非交互式认证协议。
Figure BDA0001158675750000111
可以采用非交互式认证从而提供零知识中的第一分组认证。例如,通过证明终端设备发送的第一分组可以包含以下认证记号,其足以使得验证终端设备确立证明的终端设备的标识:
Figure BDA0001158675750000112
认证是第一分组,因为在构造认证记号之前,与接收(验证)终端设备的任何通信都是不必要的。此外,发送(证明)终端设备的验证在不与发送(证明)终端设备通信的情况下完成。观察到分组auth的偷听对手将不能重播分组,因为时间戳τ不再是当前的。算法6示出了设备到设备第一分组相互认证。
Figure BDA0001158675750000121
两个通信设备能够如所期望地(即,动态地)利用算法6(再)认证并且同时通过发送包括认证记号和新会话密钥的auth-update消息来确立新会话密钥。参考图1,例如,如果设备D1希望向设备D5证明第一分组上的标识,则同时与设备D5确立新的会话密钥,auth-update分组则是
Figure BDA0001158675750000122
该设备的一个实施方案可以包括配备有例如215,000个逻辑单元、13兆字节的块随机存取存储器以及700个数字信号处理(DSP)片的Xilinx Artix 7现场可编程门阵列(FPGA)平台。在采用例如椭圆曲线密码学的实施方案中,硬件数学引擎可以被例示在板上DSP片中,PUF构造位于逻辑单元内,并且逻辑处理核包括到PUF的输入和输出并且构造为控制那些以及该设备的外部输入和输出并且执行算法(发送椭圆曲线和其它数学计算到数学引擎),如上文所描述的那些。如此构造的设备(图1中的D1-D8)随后可以连接(例如,经由网络)并且执行非交互式相互认证和动态密钥生成。若干其它物理实施方案是显而易见的,诸如在较大的集成电路上使用涂层PUF,等等。
在另一实施方案中,目标终端设备的新的“公共密钥”可以生成,而无需与目标终端设备通信来对新的随机会话密钥加密,新的随机会话密钥加密将取代当前的会话密钥。新的公共密钥可以利用如在该方面通过引用方式并入的美国专利第8,918,647中所描述的取得的记号如所期望的那样来生成。
本领域技术人员将认识到,示范性的特征和算法的其它组合和改动可以用于不同的应用,并且设备的硬件标识的使用可应用于不受所提供的实施例的零知识方面所限制的各种密码学认证技术。例如,希望与系统通信的设备可以初始地执行认证,诸如根据算法5来在第一分组中认证系统并且系统随后可以利用设备执行动态会话密钥确立协议(通过auth-update消息)以开始安全通信通道。此外,认证协议无需限于零知识,并且可以基于用于确立标识的其它密码学构造。例如,服务器可以向设备发送挑战消息,设备利用其硬件标识(例如使用由设备PUF再生成的私有密钥和标准签名算法)对该挑战消息进行数字签名并且在返回服务器的分组报头(例如,TCP选项报头(TCP Options Header)包括该签名。在接收到时,服务器利用设备的公共密钥验证其挑战上的数字签名是有效的。
因为本发明的一个实施方案依赖于椭圆曲线数学架构,本领域技术人员将认识到,其可以扩展以支持基于密码学强制角色的访问控制(RBAC)。也即,数据访问策略和设备证书可以数学方式规定,并且RBAC算法计算映射策略
Figure BDA0001158675750000131
和证书
Figure BDA0001158675750000132
到{0,1}中的访问决策的函数
Figure BDA0001158675750000133
这通常是通过构造双线性配对(例如,Weil或Tate配对)来实现的。

Claims (15)

1.安全通信设备,包括:
a.通信输入和通信输出;
b.硬件标识模块,其包括所述设备独有的硬件固有标识;以及
c.逻辑处理器,其与所述通信输入和通信输出连接且与所述硬件标识模块连接;
其中所述安全通信设备被配置为通过经由所述通信输出向期望的接收设备发送包含零知识证据认证令牌的第一分组来执行非交互式认证,所述零知识证据认证令牌是针对所述安全通信设备的公共密钥可验证的且基于所述安全通信设备的所述硬件固有标识,并且其中所述安全通信设备被进一步配置为生成加密的会话密钥且在所述第一分组中包括所述加密的会话密钥。
2.如权利要求1所述的安全通信设备,其中所述安全通信设备被进一步配置为利用非对称加密和所述期望接收设备的公共密钥对包含在所述第一分组中的会话密钥加密。
3.如权利要求1所述的安全通信设备,其中所述安全通信设备被进一步配置为在所述第一分组中包括所述安全通信设备对所述会话密钥的加密签名。
4.如权利要求2所述的安全通信设备,其中所述安全通信设备被进一步配置为在所述第一分组中包括所述安全通信设备对所述会话密钥的加密签名。
5.如权利要求1、2、3或4所述的安全通信设备,其中所述认证令牌基于时间戳。
6.如权利要求1、2、3或4所述的安全通信设备,其中所述安全通信设备被配置为发送包括基于所述安全通信设备的硬件固有标识的认证令牌且包括新会话密钥的认证更新分组。
7.如权利要求1、2、3或4所述的安全通信设备,其中所述安全通信设备还包括数学引擎。
8.如权利要求7所述的安全通信设备,其中所述安全通信设备被配置为执行椭圆曲线密码学,并且所述数学引擎被配置为执行椭圆曲线计算。
9.如权利要求1、2、3或4所述的安全通信设备,其中所述安全通信设备被进一步配置为发送包含更新后的公共密钥的认证更新分组。
10.如权利要求1、2、3或4所述的安全通信设备,其中所述硬件标识模块是物理不可克隆函数。
11.如权利要求5所述的安全通信设备,其中所述硬件标识模块是物理不可克隆函数。
12.如权利要求6所述的安全通信设备,其中所述硬件标识模块是物理不可克隆函数。
13.如权利要求7所述的安全通信设备,其中所述硬件标识模块是物理不可克隆函数。
14.如权利要求8所述的安全通信设备,其中所述硬件标识模块是物理不可克隆函数。
15.如权利要求9所述的安全通信设备,其中所述硬件标识模块是物理不可克隆函数。
CN201580027307.3A 2014-05-22 2015-05-22 利用动态密钥生成的网络认证系统 Active CN106797313B (zh)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201462001979P 2014-05-22 2014-05-22
US62/001,979 2014-05-22
PCT/US2015/032320 WO2015179849A2 (en) 2014-05-22 2015-05-22 Network authentication system with dynamic key generation

Publications (2)

Publication Number Publication Date
CN106797313A CN106797313A (zh) 2017-05-31
CN106797313B true CN106797313B (zh) 2020-09-15

Family

ID=54554985

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201580027307.3A Active CN106797313B (zh) 2014-05-22 2015-05-22 利用动态密钥生成的网络认证系统

Country Status (5)

Country Link
US (1) US10382962B2 (zh)
EP (1) EP3146670B8 (zh)
JP (1) JP6622795B2 (zh)
CN (1) CN106797313B (zh)
WO (1) WO2015179849A2 (zh)

Families Citing this family (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101243513A (zh) * 2005-08-23 2008-08-13 皇家飞利浦电子股份有限公司 使用物理单向函数的信息载体鉴别
US20150134966A1 (en) 2013-11-10 2015-05-14 Sypris Electronics, Llc Authentication System
US10432409B2 (en) 2014-05-05 2019-10-01 Analog Devices, Inc. Authentication system and device including physical unclonable function and threshold cryptography
US9672342B2 (en) 2014-05-05 2017-06-06 Analog Devices, Inc. System and device binding metadata with hardware intrinsic properties
US9946858B2 (en) 2014-05-05 2018-04-17 Analog Devices, Inc. Authentication system and device including physical unclonable function and threshold cryptography
US10547460B2 (en) * 2016-11-18 2020-01-28 Qualcomm Incorporated Message-based key generation using physical unclonable function (PUF)
US11310062B2 (en) * 2017-03-31 2022-04-19 Arizona Board Of Regents On Behalf Of Northern Arizona University Securing physically unclonable functions with additional random ternary states
CN108733311B (zh) * 2017-04-17 2021-09-10 伊姆西Ip控股有限责任公司 用于管理存储系统的方法和设备
US10425235B2 (en) 2017-06-02 2019-09-24 Analog Devices, Inc. Device and system with global tamper resistance
US10958452B2 (en) 2017-06-06 2021-03-23 Analog Devices, Inc. System and device including reconfigurable physical unclonable functions and threshold cryptography
EP3711255A1 (en) * 2017-11-23 2020-09-23 Huawei Technologies Co., Ltd. Device, system and method for secure data communication
US11050574B2 (en) * 2017-11-29 2021-06-29 Taiwan Semiconductor Manufacturing Company, Ltd. Authentication based on physically unclonable functions
EP3769466A1 (en) * 2018-03-23 2021-01-27 Nchain Holdings Limited Computer-implemented system and method for enabling zero-knowledge proof
EP3815300A4 (en) * 2018-06-27 2022-03-23 Unm Rainforest Innovations ROBUST AUTHENTICATION TECHNIQUE BASED ON CORRELATION USING ONLY AUXILIARY DATA
CN109104410B (zh) * 2018-07-12 2021-01-01 湖北工业大学 一种信息的匹配方法及装置
US11379263B2 (en) * 2018-08-13 2022-07-05 Ares Technologies, Inc. Systems, devices, and methods for selecting a distributed framework
US11316692B2 (en) * 2018-08-13 2022-04-26 Ares Technologies, Inc. Systems, devices, and methods for selecting a distributed framework
US11271759B2 (en) * 2018-09-05 2022-03-08 Arizona Board Of Regents On Behalf Of Northern Arizona University Secure digital signatures using physical unclonable function devices with reduced error rates
US10999082B2 (en) 2018-09-28 2021-05-04 Analog Devices, Inc. Localized garbled circuit device
AT522608A1 (de) * 2019-05-16 2020-12-15 Evva Sicherheitstechnologie Verfahren zum Betreiben eines Zutrittskontrollsystems sowie Zutrittskontrollsystem
CN110120874B (zh) * 2019-05-28 2021-04-20 湖南大学 基于物理不可克隆函数的轻量级密钥共享方法
CN110519052B (zh) * 2019-08-23 2022-07-05 青岛海尔科技有限公司 基于物联网操作系统的数据交互方法和装置
CN111224783B (zh) * 2019-11-26 2021-07-23 复旦大学 一种支持密钥刷新的两方椭圆曲线数字签名方法
CN113765856B (zh) * 2020-06-04 2023-09-08 中移(成都)信息通信科技有限公司 身份认证方法、装置、设备和介质
US11804971B2 (en) 2020-08-05 2023-10-31 Analog Devices, Inc. Correcting physical unclonable function errors based on short integers solutions to lattice problems

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030048173A1 (en) * 2001-09-06 2003-03-13 Satoshi Shigematsu Authentication method, authentication system, and authentication token
CN101411117A (zh) * 2006-05-21 2009-04-15 国际商业机器公司 断言消息签名
US20100122093A1 (en) * 2005-07-07 2010-05-13 Koninklijke Philips Electronics N.V. Method, apparatus and system for verifying authenticity of an object

Family Cites Families (55)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2948294B2 (ja) * 1990-09-20 1999-09-13 松下電器産業株式会社 認証機能付き鍵配送システムにおける端末
US20030004817A1 (en) * 2001-06-27 2003-01-02 Conoco Inc Visual database for linking geography to seismic data
US8346951B2 (en) 2002-03-05 2013-01-01 Blackridge Technology Holdings, Inc. Method for first packet authentication
US7245718B2 (en) 2003-08-26 2007-07-17 Mitsubishi Electric Research Laboratories, Inc. Low bandwidth zero knowledge authentication protocol and device
US20050222896A1 (en) 2003-09-19 2005-10-06 Rhyne Joseph C Systems, methods, and software for leveraging informational assets across multiple business units
KR20060113685A (ko) 2003-10-29 2006-11-02 코닌클리케 필립스 일렉트로닉스 엔.브이. 물리적 랜덤 함수들을 함께 공유하는 신뢰성 있는 포워드비밀 키의 시스템 및 방법
US20050149496A1 (en) 2003-12-22 2005-07-07 Verity, Inc. System and method for dynamic context-sensitive federated search of multiple information repositories
US7549048B2 (en) * 2004-03-19 2009-06-16 Microsoft Corporation Efficient and secure authentication of computing systems
US7581248B2 (en) 2004-06-28 2009-08-25 International Business Machines Corporation Federated identity brokering
US7702927B2 (en) 2004-11-12 2010-04-20 Verayo, Inc. Securely field configurable device
WO2006130725A2 (en) * 2005-05-31 2006-12-07 Interdigital Technology Corporation Authentication and encryption methods using shared secret randomness in a joint channel
JP2009508430A (ja) 2005-09-14 2009-02-26 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ 品目の真正性を判定するデバイス、システム及び方法
WO2007063473A1 (en) 2005-11-29 2007-06-07 Koninklijke Philips Electronics N.V. Physical secret sharing and proofs of vicinity using pufs
US7926089B2 (en) 2006-07-14 2011-04-12 Hewlett-Packard Development Company, L.P. Router for managing trust relationships
US8787566B2 (en) 2006-08-23 2014-07-22 Red Hat, Inc. Strong encryption
JP4345794B2 (ja) * 2006-09-28 2009-10-14 ソニー株式会社 固体撮像素子の製造方法
US8510608B2 (en) 2006-11-06 2013-08-13 Panasonic Corporation Generating PUF error correcting code using redundant hardware
US20080256549A1 (en) 2007-04-10 2008-10-16 International Business Machines Corporation System and Method of Planning for Cooperative Information Processing
US8463813B2 (en) 2007-04-12 2013-06-11 Younite, Inc. Individualized data sharing
US8290150B2 (en) 2007-05-11 2012-10-16 Validity Sensors, Inc. Method and system for electronically securing an electronic device using physically unclonable functions
US20110215829A1 (en) 2007-08-22 2011-09-08 Intrinsic Id B.V. Identification of devices using physically unclonable functions
US20090063860A1 (en) * 2007-08-31 2009-03-05 Albert Tyler Barnett Printer driver that encrypts print data
CN101542496B (zh) * 2007-09-19 2012-09-05 美国威诚股份有限公司 利用物理不可克隆功能的身份验证
US7962516B2 (en) 2008-02-05 2011-06-14 International Business Machines Corporation System and method for adding multi-level security to federated asset repositories
KR20090104421A (ko) 2008-03-31 2009-10-06 고려대학교 산학협력단 무선센서네트워크에서의 타원곡선암호 기반 키 설정 방법과이를 이용한 무선센서네트워크 시스템 및 기록매체
CN102077205B (zh) 2008-06-27 2015-12-16 皇家飞利浦电子股份有限公司 用于检验物品的真实性、完整性和/或物理状态的设备、系统和方法
TWI498827B (zh) 2008-11-21 2015-09-01 Verayo Inc 非連網射頻辨識裝置物理不可複製功能之鑑認技術
JP5101535B2 (ja) * 2009-01-19 2012-12-19 日本電信電話株式会社 認証方法、認証システム、プログラムおよび共有鍵生成方法
US8555069B2 (en) * 2009-03-06 2013-10-08 Microsoft Corporation Fast-reconnection of negotiable authentication network clients
JP5548218B2 (ja) 2009-03-06 2014-07-16 イントリンシツク・イー・デー・ベー・ベー 物理的システムに依存する暗号鍵を確立するためのシステム
EP2230794A3 (en) 2009-03-16 2011-10-05 Technische Universität München Towards Electrical, Integrated Implementations of SIMPL Systems
US8379856B2 (en) 2009-06-17 2013-02-19 Empire Technology Development Llc Hardware based cryptography
US8811615B2 (en) 2009-08-05 2014-08-19 Verayo, Inc. Index-based coding with a pseudo-random source
US8468186B2 (en) 2009-08-05 2013-06-18 Verayo, Inc. Combination of values from a pseudo-random source
KR101452713B1 (ko) * 2009-10-30 2014-10-21 삼성전자주식회사 픽처 경계의 부호화 단위를 부호화, 복호화 하는 방법 및 장치
US20130051552A1 (en) * 2010-01-20 2013-02-28 Héléna Handschuh Device and method for obtaining a cryptographic key
US20120072717A1 (en) 2010-02-01 2012-03-22 Hayes John W Dynamic identity authentication system
US8281127B2 (en) 2010-02-01 2012-10-02 Blackridge Technology Holdings, Inc. Method for digital identity authentication
US8458489B2 (en) 2010-03-25 2013-06-04 Empire Technology Development Llc Differential uncloneable variability-based cryptography
US20110299678A1 (en) 2010-06-07 2011-12-08 Alexander Roger Deas Secure means for generating a specific key from unrelated parameters
US8848905B1 (en) 2010-07-28 2014-09-30 Sandia Corporation Deterrence of device counterfeiting, cloning, and subversion by substitution using hardware fingerprinting
US8667265B1 (en) * 2010-07-28 2014-03-04 Sandia Corporation Hardware device binding and mutual authentication
US8516269B1 (en) 2010-07-28 2013-08-20 Sandia Corporation Hardware device to physical structure binding and authentication
US20120137137A1 (en) 2010-11-30 2012-05-31 Brickell Ernest F Method and apparatus for key provisioning of hardware devices
US8418006B1 (en) 2010-12-07 2013-04-09 Xilinx, Inc. Protecting a design for an integrated circuit using a unique identifier
US8386990B1 (en) 2010-12-07 2013-02-26 Xilinx, Inc. Unique identifier derived from an intrinsic characteristic of an integrated circuit
US20120183135A1 (en) 2011-01-19 2012-07-19 Verayo, Inc. Reliable puf value generation by pattern matching
US8566579B2 (en) 2011-03-15 2013-10-22 Sandia Corporation Obfuscated authentication systems, devices, and methods
US8643244B2 (en) * 2011-07-25 2014-02-04 Hamilton Sundstrand Corporation Strength cast rotor for an induction motor
US9547761B2 (en) * 2012-04-09 2017-01-17 Mcafee, Inc. Wireless token device
US8525169B1 (en) 2012-08-10 2013-09-03 International Business Machines Corporation Reliable physical unclonable function for device authentication
US20150008240A1 (en) * 2013-07-08 2015-01-08 Douglas Mark Davis Refillable Lotion Back Applicator
US9489501B2 (en) * 2013-09-19 2016-11-08 Fujitsu Limited Authentication method, authentication device, and system
US20150134966A1 (en) 2013-11-10 2015-05-14 Sypris Electronics, Llc Authentication System
US9628272B2 (en) 2014-01-03 2017-04-18 William Marsh Rice University PUF authentication and key-exchange by substring matching

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030048173A1 (en) * 2001-09-06 2003-03-13 Satoshi Shigematsu Authentication method, authentication system, and authentication token
US20100122093A1 (en) * 2005-07-07 2010-05-13 Koninklijke Philips Electronics N.V. Method, apparatus and system for verifying authenticity of an object
CN101411117A (zh) * 2006-05-21 2009-04-15 国际商业机器公司 断言消息签名

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Efficient deniable authentication protocol based on generalized ElGamal signature scheme;SHAO, Zuhua;《Computer Standards & Interfaces》;20031104;489-454 *
一种基于椭圆曲线离散对数问题的非交互式认证协议;邵飞等;《小型微型计算机系统》;20140131;第35卷(第1期);89-92 *

Also Published As

Publication number Publication date
EP3146670B1 (en) 2021-08-18
JP6622795B2 (ja) 2019-12-18
EP3146670A4 (en) 2018-01-17
EP3146670B8 (en) 2021-09-22
US20150341792A1 (en) 2015-11-26
US10382962B2 (en) 2019-08-13
WO2015179849A3 (en) 2016-01-14
WO2015179849A2 (en) 2015-11-26
CN106797313A (zh) 2017-05-31
EP3146670A2 (en) 2017-03-29
JP2017517229A (ja) 2017-06-22

Similar Documents

Publication Publication Date Title
CN106797313B (zh) 利用动态密钥生成的网络认证系统
US10931467B2 (en) Authentication system and device including physical unclonable function and threshold cryptography
Wallrabenstein Practical and secure IoT device authentication using physical unclonable functions
US10013543B2 (en) System and device binding metadata with hardware intrinsic properties
US9998445B2 (en) Authentication system
US9806718B2 (en) Authenticatable device with reconfigurable physical unclonable functions
US9946858B2 (en) Authentication system and device including physical unclonable function and threshold cryptography
CN106576046B (zh) 将元数据与硬件固有属性绑定的系统和设备
CN107615285B (zh) 包括物理不可克隆功能和阈值加密的认证系统和装置
Dwivedi et al. A fingerprint based crypto-biometric system for secure communication
JP2014523192A (ja) デバイス及びサーバの通信におけるファジーな認証情報を用いた暗号化によるセキュリティ
Zhao et al. ePUF: A lightweight double identity verification in IoT
Bouchaala et al. Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card
JP2017524306A (ja) 暗号化操作における悪意のある変更に対する保護
Braeken PUF‐Based Authentication and Key Exchange for Internet of Things
Byun A generic multifactor authenticated key exchange with physical unclonable function
Byun Research Article A Generic Multifactor Authenticated Key Exchange with Physical Unclonable Function
Delfs et al. Cryptographic protocols

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant