Comments on Physically Unclonable Function Based Two-Factor Authentication Protocols

被引:0
|
作者
Jin Wook Byun
Ik Rae Jeong
机构
[1] Pyeongtaek University,Department of Information and Communication
[2] Korea University,Faculty of Graduate School of Information Security
来源
关键词
Physical unclonable function; Authentication; Password guessing attack;
D O I
暂无
中图分类号
学科分类号
摘要
Physically unclonable function (PUF) is an embedded hardware-based function in a device and cannot be cloned or reproduced on another device. Due to its unclonability, the PUF has been one of the hot issues in IoT devices over pervasive communication network. Recently, there have been attempts to combine a password with an input of PUF for more efficient authentication over insecure communication. In this paper, we firstly raise a question that “Is it really secure if a password is used for an input of PUF?”. Up to now, to the best of our knowledge, only two password-based PUF authentications have been introduced in the literature. We revisit two schemes in view of an off-line password guessing attack. Under a practical PUF assumption, however, we observe that two protocols are susceptible to an off-line dictionary attack. We also present a quite simple but powerful countermeasure.
引用
收藏
页码:1243 / 1252
页数:9
相关论文
共 50 条
  • [1] Comments on Physically Unclonable Function Based Two-Factor Authentication Protocols
    Byun, Jin Wook
    Jeong, Ik Rae
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2019, 106 (03) : 1243 - 1252
  • [2] Two-Factor Authentication Protocol Using Physical Unclonable Function for IoV
    Jiang, Qi
    Zhang, Xin
    Zhang, Ning
    Tian, Youliang
    Ma, Xindi
    Ma, Jianfeng
    [J]. 2019 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2019,
  • [3] Functional mobile-based two-factor authentication by photonic physical unclonable functions
    Silverio, Tiago
    Dias, Lilia M. S.
    Ramalho, Joao F. C. B.
    Correia, Sandra F. H.
    Fu, Lianshe
    Ferreira, Rute A. S.
    Andre, Paulo S.
    [J]. AIP ADVANCES, 2022, 12 (08)
  • [4] Error reduction of SRAM-based physically unclonable function for chip authentication
    Kim, Moon-Seok
    Kim, Sungho
    Yoo, Sang-Kyung
    Lee, Bong-Soo
    Yu, Ji-Man
    Tcho, Il-Woong
    Choi, Yang-Kyu
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (05) : 1087 - 1098
  • [5] Efficient Anonymous Authentication Based on Physically Unclonable Function in Industrial Internet of Things
    Zhang, Qingyang
    Wu, Jing
    Zhong, Hong
    He, Debiao
    Cui, Jie
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 233 - 247
  • [6] Error reduction of SRAM-based physically unclonable function for chip authentication
    Moon-Seok Kim
    Sungho Kim
    Sang-Kyung Yoo
    Bong-Soo Lee
    Ji-Man Yu
    Il-Woong Tcho
    Yang-Kyu Choi
    [J]. International Journal of Information Security, 2023, 22 : 1087 - 1098
  • [7] TWO-FACTOR AUTHENTICATION SYSTEM
    Tsymzhitov, Gonchik
    Zudilova, Tatiana
    Voituk, Tatiana
    [J]. INFORMATICS, GEOINFORMATICS AND REMOTE SENSING CONFERENCE PROCEEDINGS, SGEM 2016, VOL I, 2016, : 505 - 512
  • [8] On the Usability of Two-Factor Authentication
    Wang, Ding
    Wang, Ping
    [J]. INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 141 - 150
  • [9] A Two-Factor Authentication Scheme based on Negative Databases
    Liu, Ran
    Wang, Xiang
    Wang, Can
    [J]. 2018 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), 2018, : 1110 - 1115
  • [10] k-strong privacy for radio frequency identification authentication protocols based on physically unclonable functions
    Kardas, Suleyman
    Celik, Serkan
    Bingol, Muhammed Ali
    Kiraz, Mehmet Sabir
    Demirci, Huseyin
    Levi, Albert
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2015, 15 (18): : 2150 - 2166