Secure Your Digital Fortress: Revolutionizing Cybersecurity with Next-Gen PUF TechnologyThe Need: In contemporary cybersecurity landscapes, the conventional methods of employing Physically Unclonable Functions (PUFs) necessitate maintaining a secure challenge-response database. However, this practice poses significant security risks as access to this database could lead to the compromise of authentication and encryption protocols. There's a pressing demand for innovative systems and methodologies that can implement PUFs effectively even when the challenge-response database is not entirely secure. The Technology: Our solution introduces a novel approach to utilizing PUFs. By employing a series of PUFs and performing hash operations on their responses, we generate hashed-response bit strings. These strings, along with the challenge bit strings, are securely stored in a database, eliminating the need for keeping the challenges and responses secret. This method ensures robust security even when the challenge-response database is not entirely secure. Commercial Applications:
Benefits/Advantages:
|
Tech IDT2022-176 CollegeLicensing ManagerDahlman, Jason "Jay" InventorsCategories |