Student Work

Authentication Schemes based on Physically Unclonable Functions

Public

Downloadable Content

open in viewer

In this project we investigate dierent hardware authentication schemes based on Physically Unclonable Functions. We start by analyzing the concepts of a fuzzy extractor and a secure sketch from an information-theoretic perspective. We then present a hardware implementation of a fuzzy extractor which uses the code oset construction with BCH codes. Finally, we propose a new cryptographic protocol for PUF authentication based upon polynomial interpolation using Sudan's list-decoding algorithm. We provide preliminary results into the feasibility of this protocol, by looking at the practicality of nding a polynomial that can be assigned as a cryptographic key to each device.

  • This report represents the work of one or more WPI undergraduate students submitted to the faculty as evidence of completion of a degree requirement. WPI routinely publishes these reports on its website without editorial or peer review.
Creator
Publisher
Identifier
  • E-project-043009-165443
Advisor
Year
  • 2009
Date created
  • 2009-04-30
Resource type
Major
Rights statement
Last modified
  • 2021-01-06

Relations

In Collection:

Items

Items

Permanent link to this page: https://digital.wpi.edu/show/tx31qk42s