Instructional Leadership, emphasis: K-12 School Leadership (MEd)
Wires that are connected to a computer.

Salted Hashing Protocol for Response-Based Cryptography


Description

The present method is used to secure client devices that are equipped with physical unclonable functions (PUFs). The PUF acts as a unique identifier or fingerprint of each client device, enabling them to generate bit streams on demand. These are then used as input into cryptographic algorithms, replacing random number generators. This response-based cryptography protocol allows a server to authenticate client devices. This method uses hashing of the PUF response generated by the client which is sent to the server, which carries out a search to find the permuted challenge that, when hashed, will produce the client’s message digest. This method requires that the server and client share a salt which is used to generate public and private key pairs.

Additional information

Patent number and inventor

Patent pending

Michael Gowanlock, Bertrand Cambou, Kaitlyn Lee, and Christopher Philabaum.

Potential applications

Cybersecurity applications.

Benefits and advantages

Unlike existing protocols, the method is intended for general purpose use and allows for the incorporation of many asymmetric cryptographic protocols into the system.

Case number and licensing status

2021-049

This invention is available for licensing.