Instructional Leadership, emphasis: K-12 School Leadership (MEd)
Wires that are connected to a computer.

Encryption Schemes with Addressable Elements


Description

The technology uses physical unclonable functions (PUFs) that complement or replace existing public key infrastructures (PKIs). In the personalization step, a look-up table associated with a specific client or device is downloaded by a secure network server computer. Each client or device that communicates with the server computer generates its own unique lookup table using an array of addressable PUF generators (APG). The lookup tables contain addresses and instructions for generating challenge-response pairs (CRPs). In turn, the look-up tables act as the public keys of the secure communication scheme. The resulting challenges or responses act as secure private keys. The APGs can be designed with memory arrays and stringent error-correcting methods to generate many private keys for cryptographic protocols. After the personalization process, encryption schemes for authentication can be used.

Additional information

Patent number and inventor

16/492,572

Bertrand Cambou

Potential applications

This technology is designed for use with cryptographic systems and authentication methods.

Benefits and advantages

Unlike existing PKIs, this technology does not require distributed users to store private keys. Instead, it relies on addressable elements such as PUFs. Unlike current PKIs that are based on algorithms, such as RSA and Elliptic Curve Cryptography (ECC), the technology’s encryption schemes are not based on mathematical equations to generate public and private key pairs, which are vulnerable to attack.

Case number and licensing status

2017-21

This invention is available for licensing.