Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching

Mechanisms for operating a prover device and a verifier device so that the verifier device can verify the authenticity of the prover device. The prover device generates a data string by: (a) submitting a challenge to a physical unclonable function (PUF) to obtain a response string, (b) selecting a substring from the response string, (c) injecting the selected substring into the data string, and (d) injecting random bits into bit positions of the data string not assigned to the selected substring. The verifier: (e) generates an estimated response string by evaluating a computational model of the PUF based on the challenge; (f) performs a search process to identify the selected substring within the data string using the estimated response string; and (g) determines whether the prover device is authentic based on a measure of similarity between the identified substring and a corresponding substring of the estimated response string.

Researchers

Masoud Rostami / Farinaz Koushanfar / Mehrdad Majzoobi / Srinivas Devadas

Departments: Dept of Electrical Engineering & Computer Science
Technology Areas: Communication Systems: Wireless / Computer Science: Networking & Signals
Impact Areas: Connected World

  • puf authentication and key-exchange by substring matching
    United States of America | Granted | 9,628,272

License this technology

Interested in this technology? Connect with our experienced licensing team to initiate the process.

Sign up for technology updates

Sign up now to receive the latest updates on cutting-edge technologies and innovations.