{"id":348,"date":"2023-04-24T23:06:09","date_gmt":"2023-04-24T23:06:09","guid":{"rendered":"https:\/\/nau.edu\/research\/?page_id=348"},"modified":"2024-12-12T20:40:44","modified_gmt":"2024-12-12T20:40:44","slug":"securing-distributed-elements","status":"publish","type":"page","link":"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/securing-distributed-elements\/","title":{"rendered":"Securing Distributed Elements Connected to a Network with Addressable Physically Unclonable Functions (PUFs)"},"content":{"rendered":"<div class=\"nau-block nau-block-left-nav-top-bound\">\n    \t<button id=\"left-nav-toggle-btn\" onclick=\"toggleNav();\">\n\t\tON THIS PAGE \n\t\t<i id=\"chevron-icon\" class=\"fas fa-solid fa-chevron-down\"><\/i>\n\t<\/button>\n\t<div id=\"left-nav-menu-track\">\n\t\t<div id=\"left-nav-wrapper\">\n\t\t\t<div class=\"rfi-above-anchor-tags\">\n\t\t\t\t<div class=\"ri-container\">\n\t\t\t\t\t<a href=\"https:\/\/nau.edu\/admissions\/request-information\/\" id=\"request-info\" class=\"btn bg-true-blue left-nav-menu-bottom-button display-mobile\">Request info&nbsp;&nbsp;<\/a>\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div id=\"left-nav-menu\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"menu-section backcolor\">\n\t\t\t\t\t<div class=\"header\">\n\t\t\t\t\t\tHOW CAN WE HELP?\t\t\t\t\t<\/div>\n\t\t\t\t\t<ul class=\"responsive-icons\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a href=\"tel:928-523-4620\"><img decoding=\"async\" src=\"https:\/\/in.nau.edu\/wp-content\/themes\/nau-marketing-2021\/img\/icon-phone.svg\" alt=\"Telephone:\"> 928-523-4620<\/a>\n\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t<li><a href=\"mailto:nauinnovations@nau.edu\"><img decoding=\"async\" src=\"https:\/\/in.nau.edu\/wp-content\/themes\/nau-marketing-2021\/img\/icon-email.svg\" alt=\"Email:\"><span class=\"left-nav-email\"> nauinnovations&#8203;@nau.edu <\/span><\/a><\/li>\n\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n<section class=\"nau-block left-nav-section\"><header class=\"entry-header\"><div class=\"breadcrumb\"><ol class=\"breadcrumbs\"><li><a href=\"https:\/\/in.nau.edu\">IN<\/a><span class=\"breadcrumb-chevron\" aria-hidden=\"true\">&gt;<\/span><\/li><li><a href=\"https:\/\/in.nau.edu\/research\">Research<\/a><span class=\"breadcrumb-chevron\" aria-hidden=\"true\">&gt;<\/span><\/li><li class=\"current\">Pages<\/li><\/ol><\/div><h1 class=\"entry-title text-left \">Securing Distributed Elements Connected to a Network with Addressable Physically Unclonable Functions (PUFs)<\/h1><hr class=\"h1-hr  text-left \" role=\"none\"><\/header><!-- .entry-header --><\/section><!-- <section class=\"nau-block left-nav-section grid-md-12\">\n    <header class=\"entry-header\">\n        <h1 class=\"entry-title text-left \" tabindex=\"0\" id=\"h1-first\">Dummy H1<\/h1>\n        <hr class=\"h1-hr  text-left \" role=\"none\">\n    <\/header>\n<\/section> -->\n\n<section class=\"nau-block left-nav-section grid-md-12\">\n    <div class=\"page-content\">\n        \n\n<h2 class=\"wp-block-heading\">Description<\/h2>\n\n\n\n<p>The technology uses of an array of physical unclonable functions (PUFs), enhancing the security of distributed elements (e.g., subscriber identity module or SIM card) that use security systems. Distributed elements do not need the capability to store or memorize authentication patterns, because they can be stored within a secure host server. This technology is based on the replacement of the hackable storage of secure keys, in the distributed elements, by arrays of addressable PUF generators (APG), which do not have storage capabilities. Also, the methods used replace the single static master key with a dynamic key assignment generated by the APGs. Traditional authentication mechanisms can be combined with hash functions on both the network and the user sides, referred to as AAH (APG-based authentication and hashing). Finally, the security protocols have two steps: personalization and authentication.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Additional information<\/h2>\n\n\n\n<section  \n    class=\"nau-block nau-block-panels   \" \n    data-layout_mobile=\"groupLayout-Stack gutter_Default panelLayoutPhotoTextVertical  photoAspect-1-1\"\n        data-layout_tablet=\"groupLayout-Stack gutter_Default panelLayoutPhotoTextVertical  photoAspect-1-1\"\n        data-layout_desktop=\"groupLayout-Tabs gutter_Default panelLayoutPhotoTextVertical  photoAspect-1-1\"\n        data-layout_xl=\"groupLayout-Tabs gutter_Default panelLayoutPhotoTextVertical  photoAspect-1-1\">\n\n    <div class=\"background-wrapper\">\n        <div class=\"block-main-content\">\n            \n            \n                            <div class=\"tab-nav\" role=\"tablist\" aria-label=\"Tabs for  articles\">\n                                                \n                        <button data-panel=\"panel--0\"\n                            role=\"tab\"\n                            aria-controls=\"panel--0\"\n                            class=\"active bg-true-blue bg-none\"\n                            tabindex=\"0\">Patent number and inventor<\/button>\n                                                \n                        <button data-panel=\"panel--1\"\n                            role=\"tab\"\n                            aria-controls=\"panel--1\"\n                            class=\"after-active bg-true-blue bg-none\"\n                            tabindex=\"-1\">Potential applications<\/button>\n                                                \n                        <button data-panel=\"panel--2\"\n                            role=\"tab\"\n                            aria-controls=\"panel--2\"\n                            class=\" bg-true-blue bg-none\"\n                            tabindex=\"-1\">Benefits and advantages<\/button>\n                                                \n                        <button data-panel=\"panel--3\"\n                            role=\"tab\"\n                            aria-controls=\"panel--3\"\n                            class=\" bg-true-blue bg-none\"\n                            tabindex=\"-1\">Case number and licensing status<\/button>\n                                    <\/div>\n            \n            \n            \n            <div class=\"panel-wrapper\">\n                \n                                \n                        <div class=\"panel bg-true-blue  panelTypeText  noHover \"\n                            data-role=\"tabpanel\"\n                            data-panel=\"panel--0\"\n                            id=\"panel--0\">\n\n                            \n                                                                    <div class=\"content\">\n                                            <div class=\"text-wrapper\">\n                                                                                                <h3 class=\"h3-tab-index\">Patent number and inventor<\/h3>\n                                                \n                                                                                                    <div class=\"text\">\n                                                        <p>16\/492,562<\/p>\n<p>Bertrand Cambou and Abolfazl Razi<\/p>\n                                                    <\/div>\n                                                \n                                                                                            <\/div>\n                                        <\/div>\n\n                                    \n                                \n                                                        <\/div>\n                    \n                        <div class=\"panel bg-true-blue  panelTypeText  noHover \"\n                            data-role=\"tabpanel\"\n                            data-panel=\"panel--1\"\n                            id=\"panel--1\">\n\n                            \n                                                                    <div class=\"content\">\n                                            <div class=\"text-wrapper\">\n                                                                                                <h3 class=\"h3-tab-index\">Potential applications<\/h3>\n                                                \n                                                                                                    <div class=\"text\">\n                                                        <p>This technology is designed for use with cryptographic systems and authentication methods.<\/p>\n                                                    <\/div>\n                                                \n                                                                                            <\/div>\n                                        <\/div>\n\n                                    \n                                \n                                                        <\/div>\n                    \n                        <div class=\"panel bg-true-blue  panelTypeText  noHover \"\n                            data-role=\"tabpanel\"\n                            data-panel=\"panel--2\"\n                            id=\"panel--2\">\n\n                            \n                                                                    <div class=\"content\">\n                                            <div class=\"text-wrapper\">\n                                                                                                <h3 class=\"h3-tab-index\">Benefits and advantages<\/h3>\n                                                \n                                                                                                    <div class=\"text\">\n                                                        <p>In many network communication systems, the systems\u2019 secure elements are exposed to side channel attack when the static secret key stored in the device is compromised. The methods and system of the current technology use a set of protocols based on APGs, which protect the distributed network elements by generating dynamic secure keys. As a result, the passwords and secret keys do not require the storage in a database. Hence, the network devices are immune to traditional database attacks.<\/p>\n                                                    <\/div>\n                                                \n                                                                                            <\/div>\n                                        <\/div>\n\n                                    \n                                \n                                                        <\/div>\n                    \n                        <div class=\"panel bg-true-blue  panelTypeText  noHover \"\n                            data-role=\"tabpanel\"\n                            data-panel=\"panel--3\"\n                            id=\"panel--3\">\n\n                            \n                                                                    <div class=\"content\">\n                                            <div class=\"text-wrapper\">\n                                                                                                <h3 class=\"h3-tab-index\">Case number and licensing status<\/h3>\n                                                \n                                                                                                    <div class=\"text\">\n                                                        <p>2017-019<\/p>\n<p>This invention is available for licensing.<\/p>\n                                                    <\/div>\n                                                \n                                                                                            <\/div>\n                                        <\/div>\n\n                                    \n                                \n                                                        <\/div>\n                                                <\/div>\n\n                    <\/div>\n    <\/div>\n<\/section>\n\n    <\/div>\n<\/section>\n\n<div class=\"nau-block nau-block-left-nav-bottom-bound\">\n\n<\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":276,"featured_media":1278,"parent":59,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","ring_central_script_selection":"","footnotes":""},"class_list":["post-348","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/pages\/348","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/users\/276"}],"replies":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/comments?post=348"}],"version-history":[{"count":16,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/pages\/348\/revisions"}],"predecessor-version":[{"id":6223,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/pages\/348\/revisions\/6223"}],"up":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/pages\/59"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/media\/1278"}],"wp:attachment":[{"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/media?parent=348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}