Abstract

Using Physical Unclonable Functions (PUFs) within the server-side has been recently proposed to address security vulnerabilities of the password (PW) authentication mechanism, including attacks on the database (DB) of user credentials. Practicing this idea using available memory technologies and constrained hardware modules may offer an additional hardware security layer. Thus, finding the PWs would require the attacker to access both the hardware containing the PUF and the information stored in the DB. PUFs have been used with other cryptographic algorithms in previous studies to improve the system’s security further. However, these studies have overlooked the challenges of implementing these algorithms with constrained hardware devices. Therefore, the trade-off between the achieved security and desired efficiency is still a challenge. The presented hardware-software PUF-based solutions lead to faster computation in the server-side hardware. Also, the client-side protocol can cope with the resource limitations existing in essential applications, including constrained IoTs. Moreover, the scheme handles the instability and bit alias of the Static Random-Access Memory (SRAM) PUF. This paper’s reliable, low-cost, and efficient prototype shows the functionality of a hardware-dependent protocol that is resistant to insider, PW guessing, and man-in-the-middle attacks. The presented hardware-software can be easily integrated with the server-side. Statistical tests on the embedded SRAM show that this paper protocol improves PUF entropy responses stored in the DB. Besides, the experimental results of this work show the possibility of obtaining an SRAM with very low intra-PUF variation without using any extra hardware overhead.

Highlights

  • Authentication systems store user information in Lookup tables (LUTs) or databases (DBs)

  • The hardware-software solution proposed in this paper aims to improve mainly the system’s latency and the entropy and randomness of the streams generated by Static Random-Access Memory (SRAM) Physical Unclonable Functions (PUFs)

  • In the following, subsection A provides the results of SRAM PUF characterization

Read more

Summary

Introduction

Authentication systems store user information in Lookup tables (LUTs) or databases (DBs). This data generally includes user identification such as username ID (ID, hereafter) and associated authentication credentials such as passwords (PWs). One of the most commonly reported cyber-attacks is the hacking of the PW DBs [1, 2]. In this respect, several studies have shown that many DBs store the PWs in plaintext form [3, 4]. Since many hashing functions are well-known, an attacker may use dictionary PWs, input that PW into a hashing function, and find the resulting Message Digest (MD) in the compromised DB

Objectives
Methods
Results
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call