Student Work

Authentication Schemes based on Physically Unclonable Functions

Public

Downloadable Content

open in viewer

In this project we investigate different hardware authentication schemes based on Physically Unclonable Functions. We start by analyzing the concepts of a fuzzy extractor and a secure sketch from an information-theoretic perspective. We then present a hardware implementation of a fuzzy extractor which uses the code offset construction with BCH codes. Finally, we propose a new cryptographic protocol for PUF authentication based upon polynomial interpolation using Sudan's list-decoding algorithm. We provide preliminary results into the feasibility of this protocol, by looking at the practicality of finding a polynomial that can be assigned as a cryptographic key to each device.

  • This report represents the work of one or more WPI undergraduate students submitted to the faculty as evidence of completion of a degree requirement. WPI routinely publishes these reports on its website without editorial or peer review.
Creator
Publisher
Identifier
  • E-project-043009-165529
Award
Advisor
Year
  • 2009
Date created
  • 2009-04-30
Resource type
Major
Rights statement
Last modified
  • 2023-01-20

Relations

In Collection:

Items

Items

Permanent link to this page: https://digital.wpi.edu/show/kd17cv66n