Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Here is my dram - puf based secure protocol.I will have to do hardware implementation but first wanna create 2 applications with c + +

Here is my dram-puf based secure protocol.I will have to do hardware implementation but first wanna create 2 applications with c++ one for device part one for server and this two have to communicate to each other once this properly done can deploy to hardware and will be easier for me could you please help me with that.Thanks in advance.
First we have set-up these parameters;
Public, Private key pairs
1) Enrollment Phase: - First Device will send its Device identification (DID) to Server
- Server will send its Public key
- PUF produce a "golden" response with challenge
- Device (D) will send "golden" response with
DID + Device Challenge (C_DID) encrypted with
Device Public key
- Server will take this (C_DID, s, DID) Pub_DID
Decrypted with its private key and store it.
2) Authentication Phase: - Device will make an authorization request (Authreq, DID)
- Server will go to Database get relevant challenge (C_DID)
know the relevant "golden" response, create Nonce (h)
- Server Encrypt this challenge and Nonce and send
to Device
- Device will decrypt this challenge with its private key.
- Device will create response (R) and with Nonce send
to server back.
3) Hamming Distance (HD) is the noise.
We are comparing "golden" response + noise (+HD) compare with Response (R)
so let's "old proven" is okay, I can change this ratio later.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Professional Microsoft SQL Server 2014 Administration

Authors: Adam Jorgensen, Bradley Ball

1st Edition

111885926X, 9781118859261

More Books

Students also viewed these Databases questions

Question

List the common methods used in selecting human resources. page 254

Answered: 1 week ago