35 research outputs found

    ALGSICS - Combining physics and cryptography to enhance security and privacy in RFID systems

    Get PDF
    In this paper, we introduce several new mechanisms that are cheap to implement or integrate into RFID tags and that at the same time enhance their security and privacy properties. Our aim is to provide solutions that make use of existing (or expected) functionality on the tag or that are inherently cheap and thus, enhance the privacy friendliness of the technology "almost" for free. Our proposals, for example, make use of environmental information (presence of light temperature, humidity, etc.) to disable or enable the RFID tag. A second possibility that we explore is the use of delays in revealing a secret key used to later establish a secure communication channel. We also introduce the idea of a "sticky tag," which can be used to re-enable a disabled (or killed) tag whenever the user considers it to be safe. We discuss the security and describe usage scenarios for all solutions. Finally, we review previous works that use physical principles to provide security and privacy in RFID systems

    Practical Biometric Authentication with Template Protection

    Get PDF
    We show the feasibility of template protecting biometric authentication systems. In particular, we apply template protection schemes to fingerprint data. Therefore we first make a fixed length representation of the fingerprint data by applying Gabor filtering. Next we introduce the reliable components scheme. In order to make a binary representation of the fingerprint images we extract and then quantize during the enrollment phase the reliable components with the highest signal to noise ratio. Finally, error correction coding is applied to the binary representation. It is shown that the scheme achieves an EER of approximately 4.2% with secret length of 40 bits in experiments

    Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions

    No full text
    Virtually all applications which provide or require a security service need a secret key. In an ambient world, where (potentially) sensitive information is continually being gathered about us, it is critical that those keys be both securely deployed and safeguarded from compromise. In this paper, we provide solutions for secure key deployment and storage of keys in sensor networks and radio frequency identification systems based on the use of Physical Unclonable Functions (PUFs). In addition, to providing an overview of different existing PUF realizations, we introduce a PUF realization aimed at ultra-low cost applications. We then show how the properties of Fuzzy Extractors or Helper Data algorithms can be used to securely deploy secret keys to a low cost wireless node. Our protocols are more efficient (round complexity) and allow for lower costs compared to previously proposed ones. We also provide an overview of PUF applications aimed at solving the counterfeiting of goods and devices

    Experimental hardware for coating PUFs and optical PUFs

    No full text
    \u3cp\u3eIn this chapter we discuss the hardware that was used to perform experiments on physical unclonable functions (PUFs).We describe the measurement setups and experimental samples in the case of coating PUFs and optical PUFs. These are two vastly different systems-the former based on integrated circuit (IC) technology and the latter on laser optics.\u3c/p\u3

    Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions

    No full text
    Virtually all applications which provide or require a security service need a secret key. In an ambient world, where (potentially) sensitive information is continually being gathered about us, it is critical that those keys be both securely deployed and safeguarded from compromise. In this paper, we provide solutions for secure key deployment and storage of keys in sensor networks and radio frequency identification systems based on the use of Physical Unclonable Functions (PUFs). In addition, to providing an overview of different existing PUF realizations, we introduce a PUF realization aimed at ultra-low cost applications. We then show how the properties of Fuzzy Extractors or Helper Data algorithms can be used to securely deploy secret keys to a low cost wireless node. Our protocols are more efficient (round complexity) and allow for lower costs compared to previously proposed ones. We also provide an overview of PUF applications aimed at solving the counterfeiting of goods and devices

    Competentieprofielen. Over schillen en knoppen.

    No full text
    Er worden competentieprofielen beschreven voor vier doelgroepen die betrokken zijn bij onderwijsinnovatie met gebruik van ICT: ontwikkelaars van digitale materialen, opleidingsmanagers, docenten en onderwijsexperts. Het doel is een overzicht te geven van relevante competenties voor deze doelgroepen zodat het huidige en toekomstige scholingsaanbod van de DU getoetst kan worden aan professionaliseringsbehoeften
    corecore