Unconditionally Secure Credit/Debit Card Chip Scheme and Physical Unclonable Function

被引:19
作者
Kish, Laszlo B. [1 ]
Entesari, Kamran [1 ]
Granqvist, Claes-Goran [2 ]
Kwan, Chiman [3 ]
机构
[1] Texas A&M Univ, Dept Elect & Comp Engn, College Stn, TX 77843 USA
[2] Uppsala Univ, Dept Engn Sci, Angstrom Lab, POB 534, SE-75121 Uppsala, Sweden
[3] Signal Proc Inc, 9605 Med Ctr Dr, Rockville, MD 20850 USA
来源
FLUCTUATION AND NOISE LETTERS | 2017年 / 16卷 / 01期
关键词
KLJN key exchange; card protocol; PUF; unconditional security; NOISE; ATTACK;
D O I
10.1142/S021947751750002X
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The statistical-physics-based Kirchhoff-law-Johnson-noise (KLJN) key exchange offers a new and simple unclonable system for credit/ debit card chip authentication and payment. The key exchange, the authentication and the communication are unconditionally secure so that neither mathematics-nor statistics-based attacks are able to crack the scheme. The ohmic connection and the short wiring lengths between the chips in the card and the terminal constitute an ideal setting for the KLJN protocol, and even its simplest versions offer unprecedented security and privacy for credit/debit card chips and applications of physical unclonable functions (PUFs).
引用
收藏
页数:8
相关论文
共 16 条
[1]  
[Anonymous], 1992, Information retrieval: Data structures and algorithms
[2]   CURRENT INJECTION ATTACK AGAINST THE KLJN SECURE KEY EXCHANGE [J].
Chen, Hsien-Pu ;
Mohammad, Muneer ;
Kish, Laszlo B. .
METROLOGY AND MEASUREMENT SYSTEMS, 2016, 23 (02) :173-181
[3]  
Cho A, 2005, SCIENCE, V309, P2148
[4]   When organized crime applies academic results: a forensic analysis of an in-card listening device [J].
Ferradi, Houda ;
Geraud, Remi ;
Naccache, David ;
Tria, Assia .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2016, 6 (01) :49-59
[5]   Effective privacy amplification for secure classical communications [J].
Horvath, T. ;
Kish, L. B. ;
Scheuer, J. .
EPL, 2011, 94 (02)
[6]   Unconditionally secure computers, algorithms and hardware, such as memories, processors, keyboards, flash and hard drives [J].
Kish, Laszlo B. ;
Saidi, Olivier .
FLUCTUATION AND NOISE LETTERS, 2008, 8 (02) :L95-L98
[7]   RANDOM-RESISTOR-RANDOM-TEMPERATURE KIRCHHOFF-LAW-JOHNSON-NOISE (RRRT-KLJN) KEY EXCHANGE [J].
Kish, Laszlo B. ;
Granqvist, Claes G. .
METROLOGY AND MEASUREMENT SYSTEMS, 2016, 23 (01) :3-11
[8]   On the security of the Kirchhoff-law-Johnson-noise (KLJN) communicator [J].
Kish, Laszlo B. ;
Granqvist, Claes G. .
QUANTUM INFORMATION PROCESSING, 2014, 13 (10) :2213-2219
[9]   PHYSICAL UNCLONABLE FUNCTION HARDWARE KEYS UTILIZING KIRCHHOFF-LAW-JOHNSON-NOISE SECURE KEY EXCHANGE AND NOISE-BASED LOGIC [J].
Kish, Laszlo B. ;
Kwan, Chiman .
FLUCTUATION AND NOISE LETTERS, 2013, 12 (03)
[10]   ENHANCED SECURE KEY EXCHANGE SYSTEMS BASED ON THE JOHNSON-NOISE SCHEME [J].
Kish, Laszlo Bela .
METROLOGY AND MEASUREMENT SYSTEMS, 2013, 20 (02) :191-204