Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Here is below a DRAM PUF based secure protocol according to this: First we have set - up these parameters; Public, Private key pairs 1
Here is below a DRAM PUF based secure protocol according to this:
First we have setup these parameters;
Public, Private key pairs
Enrollment Phase: First Device will send its Device identification DID to Server
Server will send its Public key
PUF produce a "golden" response with challenge
Device D will send "golden" response with
DID Device Challenge CDID encrypted with
Device Public key
Server will take this CDID, s DID PubDID
Decrypted with its private key and store it
Authentication Phase: Device will make an authorization request Authreq DID
Server will go to Database get relevant challenge CDID
know the relevant "golden" response, create Nonce h
Server Encrypt this challenge and Nonce and send
to Device
Device will decrypt this challenge with its private key.
Device will create response R and with Nonce send
to server back.
Hamming Distance HD is the noise.
We are comparing "golden" response noise HD compare with Response R
so let's "old proven" is okay, I can change this ratio later.
Please can you help me with the questions below:
Why protocol is secure
How well this could work and so on
Mean discussion and comment on this protocol
Thanks in advance
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started