{"id":360,"date":"2023-04-24T23:12:34","date_gmt":"2023-04-24T23:12:34","guid":{"rendered":"https:\/\/nau.edu\/research\/?page_id=360"},"modified":"2024-12-12T18:20:56","modified_gmt":"2024-12-12T18:20:56","slug":"key-exchange-schemes","status":"publish","type":"page","link":"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/key-exchange-schemes\/","title":{"rendered":"Key Exchange Schemes with Addressable Elements"},"content":{"rendered":"<div class=\"nau-block nau-block-left-nav-top-bound\">\n    \t<button id=\"left-nav-toggle-btn\" onclick=\"toggleNav();\">\n\t\tON THIS PAGE \n\t\t<i id=\"chevron-icon\" class=\"fas fa-solid fa-chevron-down\"><\/i>\n\t<\/button>\n\t<div id=\"left-nav-menu-track\">\n\t\t<div id=\"left-nav-wrapper\">\n\t\t\t<div class=\"rfi-above-anchor-tags\">\n\t\t\t\t<div class=\"ri-container\">\n\t\t\t\t\t<a href=\"https:\/\/nau.edu\/admissions\/request-information\/\" id=\"request-info\" class=\"btn bg-true-blue left-nav-menu-bottom-button display-mobile\">Request info&nbsp;&nbsp;<\/a>\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div id=\"left-nav-menu\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"menu-section backcolor\">\n\t\t\t\t\t<div class=\"header\">\n\t\t\t\t\t\tHOW CAN WE HELP?\t\t\t\t\t<\/div>\n\t\t\t\t\t<ul class=\"responsive-icons\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a href=\"tel:928-523-4620\"><img decoding=\"async\" src=\"https:\/\/in.nau.edu\/wp-content\/themes\/nau-marketing-2021\/img\/icon-phone.svg\" alt=\"Telephone:\"> 928-523-4620<\/a>\n\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t<li><a href=\"mailto:nauinnovations@nau.edu\"><img decoding=\"async\" src=\"https:\/\/in.nau.edu\/wp-content\/themes\/nau-marketing-2021\/img\/icon-email.svg\" alt=\"Email:\"><span class=\"left-nav-email\"> nauinnovations&#8203;@nau.edu <\/span><\/a><\/li>\n\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n<section class=\"nau-block left-nav-section\"><header class=\"entry-header\"><div class=\"breadcrumb\"><ol class=\"breadcrumbs\"><li><a href=\"https:\/\/in.nau.edu\">IN<\/a><span class=\"breadcrumb-chevron\" aria-hidden=\"true\">&gt;<\/span><\/li><li><a href=\"https:\/\/in.nau.edu\/research\">Research<\/a><span class=\"breadcrumb-chevron\" aria-hidden=\"true\">&gt;<\/span><\/li><li class=\"current\">Pages<\/li><\/ol><\/div><h1 class=\"entry-title text-left \">Key Exchange Schemes with Addressable Elements<\/h1><hr class=\"h1-hr  text-left \" role=\"none\"><\/header><!-- .entry-header --><\/section><!-- <section class=\"nau-block left-nav-section grid-md-12\">\n    <header class=\"entry-header\">\n        <h1 class=\"entry-title text-left \" tabindex=\"0\" id=\"h1-first\">Dummy H1<\/h1>\n        <hr class=\"h1-hr  text-left \" role=\"none\">\n    <\/header>\n<\/section> -->\n\n<section class=\"nau-block left-nav-section grid-md-12\">\n    <div class=\"page-content\">\n        \n\n<h2 class=\"wp-block-heading\">Description<\/h2>\n\n\n\n<p>The technology incorporates addressable physical unclonable functions (PUFs) that complement or replace existing public key infrastructures (PKI). The novel key exchange scheme strengthens methods related to public key infrastructure that is addressable (PKA) in order to complement or replace PKIs. Unlike PKI, this scheme does not require distributed users to store private keys. The PKA is based on the generation of a public key from a private key. In addition, a cryptographic table is loaded onto the network server with a large quantity of random numbers and securely exchanged between the parties. The public keys are a set of instructions that can be shared in non-secure environments. Also, the public keys contain the information necessary to generate the private keys and are only useful to the parties that have access to the cryptographic tables. As part of the public key, a random number is generated and hashed with a password, producing a message digest that is typically 512 bits long. The message digest is used to point to multiple addresses in the cryptographic table and find the private key. The reading of the few bits located at these multiple addresses can generate different instructions to change the way the private keys are extracted. The schemes result in an increased number of possible private keys that can be extracted from each public key, in turn increasing the randomness rate and reducing collision.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Additional information<\/h2>\n\n\n\n<section  \n    class=\"nau-block nau-block-panels   \" \n    data-layout_mobile=\"groupLayout-Stack gutter_Default panelLayoutPhotoTextVertical  photoAspect-1-1\"\n        data-layout_tablet=\"groupLayout-Stack gutter_Default panelLayoutPhotoTextVertical  photoAspect-1-1\"\n        data-layout_desktop=\"groupLayout-Tabs gutter_Default panelLayoutPhotoTextVertical  photoAspect-1-1\"\n        data-layout_xl=\"groupLayout-Tabs gutter_Default panelLayoutPhotoTextVertical  photoAspect-1-1\">\n\n    <div class=\"background-wrapper\">\n        <div class=\"block-main-content\">\n            \n            \n                            <div class=\"tab-nav\" role=\"tablist\" aria-label=\"Tabs for  articles\">\n                                                \n                        <button data-panel=\"panel--0\"\n                            role=\"tab\"\n                            aria-controls=\"panel--0\"\n                            class=\"active bg-true-blue bg-none\"\n                            tabindex=\"0\">Patent number and inventor<\/button>\n                                                \n                        <button data-panel=\"panel--1\"\n                            role=\"tab\"\n                            aria-controls=\"panel--1\"\n                            class=\"after-active bg-true-blue bg-none\"\n                            tabindex=\"-1\">Potential applications<\/button>\n                                                \n                        <button data-panel=\"panel--2\"\n                            role=\"tab\"\n                            aria-controls=\"panel--2\"\n                            class=\" bg-true-blue bg-none\"\n                            tabindex=\"-1\">Benefits and advantages<\/button>\n                                                \n                        <button data-panel=\"panel--3\"\n                            role=\"tab\"\n                            aria-controls=\"panel--3\"\n                            class=\" bg-true-blue bg-none\"\n                            tabindex=\"-1\">Case number and licensing status<\/button>\n                                    <\/div>\n            \n            \n            \n            <div class=\"panel-wrapper\">\n                \n                                \n                        <div class=\"panel bg-true-blue  panelTypeText  noHover \"\n                            data-role=\"tabpanel\"\n                            data-panel=\"panel--0\"\n                            id=\"panel--0\">\n\n                            \n                                                                    <div class=\"content\">\n                                            <div class=\"text-wrapper\">\n                                                                                                <h3 class=\"h3-tab-index\">Patent number and inventor<\/h3>\n                                                \n                                                                                                    <div class=\"text\">\n                                                        <p>16\/297,438<\/p>\n<p>Bertrand Cambou, Christopher Philabaum, and Donald Telesca.<\/p>\n                                                    <\/div>\n                                                \n                                                                                            <\/div>\n                                        <\/div>\n\n                                    \n                                \n                                                        <\/div>\n                    \n                        <div class=\"panel bg-true-blue  panelTypeText  noHover \"\n                            data-role=\"tabpanel\"\n                            data-panel=\"panel--1\"\n                            id=\"panel--1\">\n\n                            \n                                                                    <div class=\"content\">\n                                            <div class=\"text-wrapper\">\n                                                                                                <h3 class=\"h3-tab-index\">Potential applications<\/h3>\n                                                \n                                                                                                    <div class=\"text\">\n                                                        <p>This technology is designed for use with cryptographic systems and authentication methods.<\/p>\n                                                    <\/div>\n                                                \n                                                                                            <\/div>\n                                        <\/div>\n\n                                    \n                                \n                                                        <\/div>\n                    \n                        <div class=\"panel bg-true-blue  panelTypeText  noHover \"\n                            data-role=\"tabpanel\"\n                            data-panel=\"panel--2\"\n                            id=\"panel--2\">\n\n                            \n                                                                    <div class=\"content\">\n                                            <div class=\"text-wrapper\">\n                                                                                                <h3 class=\"h3-tab-index\">Benefits and advantages<\/h3>\n                                                \n                                                                                                    <div class=\"text\">\n                                                        <p>Hackers are increasingly efficient at breaking private keys PKI. This technology drastically increases entropy (i.e., randomness rate) and protects the cryptographic system. Also, the technology uses a pointer and a reading element to extract a private key from a cryptographic table. The encryption scheme is not based on mathematical equations to generate public and private key pairs that are potentially vulnerable to quantum computers with the Shor algorithm. In addition, a new public key can be generated after each cycle of encryption-decryption, further strengthening the trustworthiness of the protocol.<\/p>\n                                                    <\/div>\n                                                \n                                                                                            <\/div>\n                                        <\/div>\n\n                                    \n                                \n                                                        <\/div>\n                    \n                        <div class=\"panel bg-true-blue  panelTypeText  noHover \"\n                            data-role=\"tabpanel\"\n                            data-panel=\"panel--3\"\n                            id=\"panel--3\">\n\n                            \n                                                                    <div class=\"content\">\n                                            <div class=\"text-wrapper\">\n                                                                                                <h3 class=\"h3-tab-index\">Case number and licensing status<\/h3>\n                                                \n                                                                                                    <div class=\"text\">\n                                                        <p>2017-044<\/p>\n<p>This invention is available for licensing.<\/p>\n                                                    <\/div>\n                                                \n                                                                                            <\/div>\n                                        <\/div>\n\n                                    \n                                \n                                                        <\/div>\n                                                <\/div>\n\n                    <\/div>\n    <\/div>\n<\/section>\n\n    <\/div>\n<\/section>\n\n<div class=\"nau-block nau-block-left-nav-bottom-bound\">\n\n<\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":276,"featured_media":1278,"parent":59,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","ring_central_script_selection":"","footnotes":""},"class_list":["post-360","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/pages\/360","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/users\/276"}],"replies":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/comments?post=360"}],"version-history":[{"count":15,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/pages\/360\/revisions"}],"predecessor-version":[{"id":6149,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/pages\/360\/revisions\/6149"}],"up":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/pages\/59"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/media\/1278"}],"wp:attachment":[{"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/media?parent=360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}