Instructional Leadership, emphasis: K-12 School Leadership (MEd)
Wires that are connected to a computer.

PUF-Based Key Generation for Lattice and Code Cryptography


Description

In most public key infrastructure (PKI) schemes for applications such as cryptographic currencies, financial transactions, secure mail, and wireless communications, the public keys are generated by private keys with RSA and elliptic curve cryptography (ECC). It is now anticipated that Quantum Computers (QC) will be able to break both RSA and ECC when the technology to manufacture enough quantum nodes becomes available. This disclosure describes how to generate cryptographic keys for lattice-based and code cryptography with physical unclonable functions (PUFs).

Additional information

Patent number and inventor

Patent pending

Bertrand Cambou, Dina Ghanaimiandoab, Michael Gowanlock, Kaitlyn Lee, Stefan Nelson, Christopher Philabaum, Alyssa Stenberg, Jordan Wright, and Bahattin Yildiz.

Potential applications

Cybersecurity applications.

Benefits and advantages

Lattice-based and code cryptography can replace existing schemes such as RSA and elliptic curve cryptography due to its resistance to quantum computers.

Case number and licensing status

2021-022

This invention is available for licensing.