Font Size: a A A

Research On Key Technologies Of Key Generation,Distribution,and Synchronization Based On Semiconductor Superlattice

Posted on:2024-05-20Degree:DoctorType:Dissertation
Country:ChinaCandidate:J LiuFull Text:PDF
GTID:1528306944466804Subject:Cyberspace security
Abstract/Summary:PDF Full Text Request
Key management is the most challenging part of cryptographic engineering.Breaking through the bottleneck problem of key management generation and distribution is vital in cryptographic engineering.Compared with the hardware only used as the implementation carrier of the cryptographic algorithm and key storage medium in cryptographic engineering before,the Physical Unclonable Functions(PUF)theory anchors the cryptographic security on the intrinsic security factor of physical hardware,which opens a new research idea for solving the key management.Semiconductor superlattice is a new strong PUF proposed by Chinese scholars.There are two core key management technologies based on semiconductor superlattice.One is superlattice physical random number generation technology.The second is the research on point-to-point superlattice key distribution technology based on the two characteristics of superlattice:the twinning of the same wafer and the unclonable characteristics of different wafers.Although the application of superlattice PUF in information security is gradually increasing,many problems still need to be solved to form a complete theoretical system and application ecology of superlattice cryptography application technology.The first is the superlattice’s accurate estimation of the min-entropy.At present,general methods are used to estimate the entropy without considering from the superlattice entropy source model,and there is a risk of overestimation.Furthermore,under the diversified communication network,the point-to-point superlattice key agreement technology cannot meet the high concurrency and wide access user requirements,and the research on superlattice key distribution technology between multi-point and multi-network still needs to be completed.Aiming at the above problems to be solved urgently,based on the study of superlattice min-entropy estimation and entropy loss problem from fuzzy extractor as the theoretical basis,the application research of superlattice in group security communication is completed.The main contributions are as follows:1)The black-box model is used to evaluate the min-entropy of superlattice PUF,and a randomness condenser is constructed for weak entropy source preprocessing.A Markov stochastic model is established heuristically based on the charge storage effect of superlattice PUF entropy sources.An evaluation method for estimating the superlattice output min-entropy is proposed.At the 95%confidence level,the min-entropy of the superlattice entropy source is 2.1437 bit/3 bit.In order to solve the situation that the security key cannot be extracted during the key agreement due to insufficient entropy,this paper constructs a randomness condenser,which is used before the key agreement protocol to compress the original output of the superlattice according to characters,without affecting the success rate of key agreement,it provides a key output with sufficient entropy.2)Secure group communication scheme based on different wafer Superlattice PUF.The secure group communication scheme is based on the different wafer superlattice PUFs of group key distribution,dynamic access control,and security management technology.The identity authentication protocol is designed and implemented based on the characteristics of superlattice PUF,and only the legal user with superlattice PUF can be authorized to join the communication group,which achieves lightweight and information-theoretic security.Superlattice PUF generates the unique long-lived key,the group key is agreed upon and rekeyed based on the distributed tree-based group DiffieHellman,and the members correspond to the leaf nodes of the key tree one by one.Each group member contributes the average entropy and equates the responsibility.The group key is calculated by each member independently from bottom to top,which can resist man-in-the-middle attacks,forgery attacks and collusion attacks.Each member has from its corresponding leaf nodes to the root node on the unique key path.When new members join,and existing members leave,each node only updates the key path to the key,achieving scalable,dynamic group management at the logarithmic level.3)Secure group communication scheme based on the same wafer multitwinning superlattice PUF.The group access control,secure key distribution and dynamic group management technology based on the same wafer multitwinning superlattice PUF group secure communication scheme are researched and implemented.Based on the characteristics of the same wafer multi-twinning superlattice PUF,users with the PUF have natural proof of identity and form a communications group.The group secure key agreement scheme is designed based on the point-to-point superlattice key agreement technology.The reusable fuzzy extractor is designed to ensure the security of the Challenge sequence and helper data used multiple times.The public key scheme encrypts the public data(challenge sequence),and then the subgroup key is established,which can resist man-in-the-middle attacks and machine learning modeling attacks.When a subgroup member joins or leaves,any new member chooses and broadcasts a new challenge.The remaining members obtain the same key locally through the reusable fuzzy extractor.Public key encryption of public data makes the key update operation more flexible and convenient,forming a scalable communication.
Keywords/Search Tags:Semiconductor Superlattice, Secure Group Communication, Physical Unclonable Function, Cryptography, Key Management
PDF Full Text Request
Related items