Authentication and key distribution protocol based on Diffie-Hellman algorithm and physically unclonable function
Victor A. Yakovlev, Dina Zh. Satybaldina, Eldor Egamberdiyev, Yerzhan Seitkulov
Abstract
Based on the modified Diffie-Hellman (DH) protocol, a key distribution scheme between two correspondents over open communication channels is considered. The correspondents communicate through a trusted entity. An attacker can control the communication channels between the correspondents and the channels between the correspondents and the trusted authority (TA) and perform active attacks there, including a man-in-the-middle attack. DH authentication protocol using physically unclonable functions (PUF) is proposed. A formalized PUF model based on the class of universal hash functions is presented. Namely, it is proposed to use the class of strictly universal hash functions developed by Wegman and Carter. A polynomial dependence of the possible number of PPUs on the number of answers has been proven. Requirements for PPUs suitable for authentication systems are formulated. The protocol has been analyzed, and its security has been proved
Keywords
authentication; cellular communication networks; diffie-hellman; key distribution; physically unclonable function;
DOI:
http://doi.org/10.12928/telkomnika.v22i2.25705
Refbacks
There are currently no refbacks.
This work is licensed under a
Creative Commons Attribution-ShareAlike 4.0 International License .
TELKOMNIKA Telecommunication, Computing, Electronics and Control ISSN: 1693-6930, e-ISSN: 2302-9293Universitas Ahmad Dahlan , 4th Campus Jl. Ringroad Selatan, Kragilan, Tamanan, Banguntapan, Bantul, Yogyakarta, Indonesia 55191 Phone: +62 (274) 563515, 511830, 379418, 371120 Fax: +62 274 564604
<div class="statcounter"><a title="Web Analytics" href="http://statcounter.com/" target="_blank"><img class="statcounter" src="//c.statcounter.com/10241713/0/0b6069be/0/" alt="Web Analytics"></a></div> View TELKOMNIKA Stats