Question: Here is below a DRAM PUF based secure protocol according to this: First we have set - up these parameters; Public, Private key pairs 1
Here is below a DRAM PUF based secure protocol according to this:
First we have setup these parameters;
Public, Private key pairs
Enrollment Phase: First Device will send its Device identification DID to Server
Server will send its Public key
PUF produce a "golden" response with challenge
Device D will send "golden" response with
DID Device Challenge CDID encrypted with
Device Public key
Server will take this CDID, s DID PubDID
Decrypted with its private key and store it
Authentication Phase: Device will make an authorization request Authreq DID
Server will go to Database get relevant challenge CDID
know the relevant "golden" response, create Nonce h
Server Encrypt this challenge and Nonce and send
to Device
Device will decrypt this challenge with its private key.
Device will create response R and with Nonce send
to server back.
Hamming Distance HD is the noise.
We are comparing "golden" response noise HD compare with Response R
so let's "old proven" is okay, I can change this ratio later.
Please can you help me with the questions below:
Why protocol is secure
How well this could work and so on
Mean discussion and comment on this protocol
Thanks in advance
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
