2) Authentication Phase: - Device will make an authorization request (Authreq, DID) - Server will go to Database get relevant challenge (C_DID) know the relevant "golden" response, create Nonce (h) - Server Encrypt this challenge and Nonce and send to Device Device will decrypt this challenge with its private key. - Device will create response (R) and with Nonce send to server back. 3) Hamming Distance (HD) is the noise. We are comparing "golden" response + noise (+ HD) compare with Response (R) so let's "old proven" is okay, I can change this ratio later. Please can you help me with the questions below: Why protocol is secure ? How well this could work and so on? Mean discussion and comment on this protocol Thanks in advance 1) Enrollment Phase: - First Device will send its Device identification (DID) to Server - Server will send its Public key - PUF produce a "golden" response with challenge - Device (D) will send "golden" response with DID + Device Challenge (C_DID) encrypted with Device Public key - Server will take this (C_DID, s, DID) Pub_DID Decrypted with its private key and store it.
2) Authentication Phase: - Device will make an authorization request (Authreq, DID) - Server will go to Database get relevant challenge (C_DID) know the relevant "golden" response, create Nonce (h) - Server Encrypt this challenge and Nonce and send to Device Device will decrypt this challenge with its private key. - Device will create response (R) and with Nonce send to server back. 3) Hamming Distance (HD) is the noise. We are comparing "golden" response + noise (+ HD) compare with Response (R) so let's "old proven" is okay, I can change this ratio later. Please can you help me with the questions below: Why protocol is secure ? How well this could work and so on? Mean discussion and comment on this protocol Thanks in advance 1) Enrollment Phase: - First Device will send its Device identification (DID) to Server - Server will send its Public key - PUF produce a "golden" response with challenge - Device (D) will send "golden" response with DID + Device Challenge (C_DID) encrypted with Device Public key - Server will take this (C_DID, s, DID) Pub_DID Decrypted with its private key and store it.
Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
Related questions
Question
Don't use ai
Here is below a DRAM PUF based secure protocol according to this:
First we have set
-
up these parameters;
Public, Private key pairs
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by step
Solved in 2 steps
Recommended textbooks for you
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education