Physical Unclonable Functions (PUFs) allow securely reproducing keys from variations of physical properties of a device. This work presents a new protocol for key-distribution based on such PUFs. The protocol utilizes the fact that multiple keys can be derived from certain PUF types. Similar to the Kerberos protocol, a trusted third party determines the key to be used for secure communication of devices in a network. KeLiPUF focuses on lightweight applications like they appear in in-car communications. The protocol is analyzed regarding possible threats and countermeasures for weaknesses. The dependence of the security level on the PUF’s quality as well as on other used components is discussed. A sample hardware implementation on FPGA shows the efficiency and applicability of the protocol.
«
Physical Unclonable Functions (PUFs) allow securely reproducing keys from variations of physical properties of a device. This work presents a new protocol for key-distribution based on such PUFs. The protocol utilizes the fact that multiple keys can be derived from certain PUF types. Similar to the Kerberos protocol, a trusted third party determines the key to be used for secure communication of devices in a network. KeLiPUF focuses on lightweight applications like they appear in in-car communic...
»