2) Authentication Phase: - Device will make an authorization request (Authreq, DID) - Server will go to Database get relevant challenge (C_DID) know the relevant "golden" response, create Nonce (h) - Server Encrypt this challenge and Nonce and send to Device Device will decrypt this challenge with its private key. - Device will create response (R) and with Nonce send to server back. 3) Hamming Distance (HD) is the noise. We are comparing "golden" response + noise (+ HD) compare with Response (R) so let's "old proven" is okay, I can change this ratio later. Please can you help me with the questions below: Why protocol is secure ? How well this could work and so on? Mean discussion and comment on this protocol Thanks in advance 1) Enrollment Phase: - First Device will send its Device identification (DID) to Server - Server will send its Public key - PUF produce a "golden" response with challenge - Device (D) will send "golden" response with DID + Device Challenge (C_DID) encrypted with Device Public key - Server will take this (C_DID, s, DID) Pub_DID Decrypted with its private key and store it.

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
Don't use ai  Here is below a DRAM PUF based secure protocol according to this: First we have set - up these parameters; Public, Private key pairs
2) Authentication Phase: - Device will make an authorization request (Authreq, DID)
- Server will go to Database get relevant challenge (C_DID)
know the relevant "golden" response, create Nonce (h)
- Server Encrypt this challenge and Nonce and send
to Device
Device will decrypt this challenge with its private key.
- Device will create response (R) and with Nonce send
to server back.
3) Hamming Distance (HD) is the noise.
We are comparing "golden" response + noise (+ HD) compare with Response (R)
so let's "old proven" is okay, I can change this ratio later.
Please can you help me with the questions below:
Why protocol is secure ?
How well this could work and so on?
Mean discussion and comment on this protocol
Thanks in advance
Transcribed Image Text:2) Authentication Phase: - Device will make an authorization request (Authreq, DID) - Server will go to Database get relevant challenge (C_DID) know the relevant "golden" response, create Nonce (h) - Server Encrypt this challenge and Nonce and send to Device Device will decrypt this challenge with its private key. - Device will create response (R) and with Nonce send to server back. 3) Hamming Distance (HD) is the noise. We are comparing "golden" response + noise (+ HD) compare with Response (R) so let's "old proven" is okay, I can change this ratio later. Please can you help me with the questions below: Why protocol is secure ? How well this could work and so on? Mean discussion and comment on this protocol Thanks in advance
1) Enrollment Phase: - First Device will send its Device identification (DID) to Server
- Server will send its Public key
- PUF produce a "golden" response with challenge
- Device (D) will send "golden" response with
DID + Device Challenge (C_DID) encrypted with
Device Public key
- Server will take this (C_DID, s, DID) Pub_DID
Decrypted with its private key and store it.
Transcribed Image Text:1) Enrollment Phase: - First Device will send its Device identification (DID) to Server - Server will send its Public key - PUF produce a "golden" response with challenge - Device (D) will send "golden" response with DID + Device Challenge (C_DID) encrypted with Device Public key - Server will take this (C_DID, s, DID) Pub_DID Decrypted with its private key and store it.
Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education