May 15, 2023, 1:10 a.m. | Yao Wang, Xue Mei, Zhengtai Chang, Wenbing Fan, Benqing Guo, Zhi Quan

cs.CR updates on arXiv.org arxiv.org

Simple authentication protocols based on conventional physical unclonable
function (PUF) are vulnerable to modeling attacks and other security threats.
This paper proposes an arbiter PUF based on a linear feedback shift register
(LFSR-APUF). Different from the previously reported linear feedback shift
register for challenge extension, the proposed scheme feeds the external random
challenges into the LFSR module to obfuscate the linear mapping relationship
between the challenge and response. It can prevent attackers from obtaining
valid challenge-response pairs (CRPs), increasing its …

attacks authentication authentication protocols challenge extension feedback function modeling novel physical protocol protocols puf register security security threats simple threats vulnerable

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)