Salted Hashing Protocol for Response-Based Cryptography
Description
The present method is used to secure client devices that are equipped with physical unclonable functions (PUFs). The PUF acts as a unique identifier or fingerprint of each client device, enabling them to generate bit streams on demand. These are then used as input into cryptographic algorithms, replacing random number generators. This response-based cryptography protocol allows a server to authenticate client devices. This method uses hashing of the PUF response generated by the client which is sent to the server, which carries out a search to find the permuted challenge that, when hashed, will produce the client’s message digest. This method requires that the server and client share a salt which is used to generate public and private key pairs.
Additional information
Patent number and inventor
Patent pending
Michael Gowanlock, Bertrand Cambou, Kaitlyn Lee, and Christopher Philabaum.
Potential applications
Cybersecurity applications.
Benefits and advantages
Unlike existing protocols, the method is intended for general purpose use and allows for the incorporation of many asymmetric cryptographic protocols into the system.
Case number and licensing status
2021-049
This invention is available for licensing.