首页|基于PUF的安全认证协议的对比分析

基于PUF的安全认证协议的对比分析

扫码查看
随着数字化和互联网的普及,安全性和隐私保护成为了重要关注点.物理不可克隆函数(Physical Unclonable Function,PUF)作为一种基于硬件特性的安全机制,为身份认证提供了一种新的途径.本文综述了基于PUF的安全认证协议的种类和特点,将其分为基于weak PUF和基于strong PUF两种方式,并在类型和性能等方面进行了对比分析.同时本文还对比了不同安全认证协议的安全性,揭示了它们各自面临的安全风险.最后,本文深入探讨了基于PUF的安全认证协议的应用前景,探究了其所面临的挑战与解决方案,同时描绘了未来发展的趋势和展望.
Comparative analysis of PUF-based secure authentication protocols
With the popularization of the digitalization and the Internet,security and privacy protection have become important concerns.As a hardware-based security mechanism,Physical Unclonable Func-tion(PUF)provides a new approach for the identity authentication.In this paper,types and character-istics of PUF-based secure authentication protocols are summarized,which are classified into two types of weak PUF-based and strong PUF-based respectively.Comparative analysis is conducted in terms of type and performance.Meanwhile,security capabilities of different secure authentication protocols are compared and security risk faced by each protocol is revealed.Finally,application prospect of PUF-based secure authentication protocol is deeply discussed.Challenges and solutions are explored,and trend and prospect for future development are also depicted.

PUFsecure authentication protocolsecurity mechanismsecurity risk

张跃飞、袁征、乔雅馨

展开 >

北京电子科技学院,北京市 100070

中国星网网络系统研究院有限公司,北京市 100029

PUF 安全认证协议 安全机制 安全风险

2024

北京电子科技学院学报
北京电子科技学院

北京电子科技学院学报

影响因子:0.245
ISSN:1672-464X
年,卷(期):2024.32(3)