SlideShare a Scribd company logo
1 of 19
Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin
Corporation, for the U.S. Department of Energy’s National Nuclear Security Administration under contract DE-AC04-94AL85000.
Physically Unclonable Digital ID*
Peter S. Choi, Ph.D., CISSP, CSSLP
David Zage, Ph.D.
Yung Ryn Choe, Ph.D.
Brent Wasilow
* U.S. Provisional Patent Application No. 62/175,753, filed June 15, 2015, entitled “Methods and Systems for Authenticating Identity”
PUF
 Physically Unclonable Function (PUF)
 Energy flow pattern, uniquely tied to randomness inherent in the physical
systems
 “Fingerprint” of physical object
 PUF uses (challenge, response) pair as protected secrets
 Challenge component of the PUF only exists when device is used
 PUF responses are difficult to spoof, clone, or predict
 PUF’s intrinsic properties can be used as:
 Random number generators
 Device authentication
 Encryption
 Etc.
 IC Examples: uncontrolled variability of the microfabrication processes
 Arbiter
 Ring Oscillator
 Static Random Access Memory (SRAM)
2
Why isn’t PUF utilized more?
 PUF phenomena arises from nano-scale diversity
 Current manufacturing process do not have the control at the nano-
scale
 Nano-scale physical phenomena, highly susceptible to output noise,
requiring mathematical model for error-correction
 PUF often requires storing database of challenge-response pairs
(CRPs) corresponding to the PUF component
 If the response matches the stored response, the lock opens
 In this PUF model, if CRP can be used only once, eventually running out of
CRPs
 Manufacturer has the access to CRP database  ID is permanent
 Susceptible to modeling and cloning attacks
 Access to device, access to challenge, response pair (CRP) behaviors
 Have access to PUF’s “response” pair
3
Why isn’t PUF used more? (Cont.)
 For consistent PUF behavior (complex error-correction
algorithm is needed)
 Needs “purified” energy source (e.g., homogenous current, voltage or
light source)
 Needs consistent environmental conditions (e.g. temperature,
pressure, humidity)
 Difficult to define collision space with scalable deployment
 Billions of device and billions of unique CRPs
 CRP behavior is usually very complex and difficult to pin-down
 PUFs are permanent, cannot be modified to fit human ID
 Manufacturers have access to device ID
 Confidentiality of CRP is “intrinsically” compromised
 Securing PUF CRPs from manufacturing to deployment can be challenging
and expensive
4
Quasi-Physically Unclonable Digital ID
(Q-PUDID)
 Process that integrates series of hashing
algorithms and combining it with tamper
resistant hardware functions to produce
“unclonable, dynamic” digital ID
 “unclonable”: Near impossible or cost prohibitive
to repeat
 “dynamic”: based on unique energy-material
interaction behavior
 Uses macroscopic phenomena, instead of
nanoscale phenomena
5
Innovation in Q-PUDID
 Emulates PUF functionality
 Macroscopic, physical phenomena  Mathematically reproducible
 Tamper resistant technology  Unique, uncompromisable device ID
 Discrete application of hash functions  Dynamic ID
 Q-PUDID Authentication protocol
 Extremely “protocol light”
 Cheap to produce, hard to replicate
 Pluggable and modular
 Authentication based on novel, unclonable digital ID
 Does not use Confidentiality (e.g., encryption)
 Enables “true” two form factor authentication
 ID is non-static
 Digital ID is grounded in physical world
6
Q-PUDID
 Cyber identity, anchored to unique physical device,
intentionally made very hard to replicate (e.g., tamper
resistant)
 No possibility of a mass breach (tokenized authentication on
steroid)
 Criminals must steal your device and your credential
(password/biometrics)  2 Factor Authentication
 Identity is verified through dynamic, non-static authentication
mechanism
 Q-PUDID is scalable
 More secure but less cumbersome
 Identity collision probability, mathematically scaled according to
needs
7
Quasi-PUDID Device: Activation
Q-
PUDID
Dispens
er
Q-PUDID
Authenticating
Entity’s
Q-PUDID Database
8
Example of Quasi-PUF Device
 Random pattern is burned into Q-PUDID device
 For bank application, assume time sensitive hand signature is tied to
human ID
 This “random pattern” is physically stored under tamper resistant
hardware such as Smart Card chip
 This “random pattern” is designed to interact with in-flow of data and
modifies the data unique to this “random pattern”
 This modified data is put through message digest function producing
digital signature validating the person’s ID and the Q-PUDID hardware
9
X
X
Y
Y
X
Y
Time 1
Time 2
Time 3
Unrepeatable, one-time hand
signature is captured and used
as unique physical device pattern,
“burned” into the black box function.
Q-PUDID
Dispenser
End User’s
Hand SignatureSigns & Registers
For Q-PUDID Device
Hash1
Quasi-PUDID Device Activation
Process
Authenticating Entity’s
Q-PUDID Device
Signature Escrow
Q-PUDID
Device*
* End user’s signature is burned into Q-PUDID device and by design, it is never
read by any external inquiries 10
11
10010
00010
10000
11110
10101
10011
Digital
Signature
Time
stamp/nonce
, Public Cert $aBqz#6@
Dynamic
datainput
Q-PUDID
Digitizer
SHA2
Data Input
Interface
Hidden
Physical
Process
Analog
Digital
Converter
Message
Digest/Hash
Engine
User ID
Time/Nonce
Device
Quasi-PUDID Device
Q-PUDID Device (Digital)
12
Message
Digest**
Engine
Passwd
Hash
Tamper Resistant, Q-PUDID Processor
Human Signature/
Device Specific
Random Pattern
Password
Hasher**
Digital Signature of
Auth Entity/Nonce/
Time Stamp
Dynamic
Data
User Name
Password
**Message Digest and Hash functions are used inter-changeably
$aBqz#6@
2aZ%
12:30:21 PM
12:30:21 PM,
2aZ%
$aBqz#6@
Q-PUDID
Modified
Data
Message
Digest**
Engine
Dynamic, time
Dependent,
Digital
Signature of
Device and
Human ID
Hash1
Digital Signature sent to Authenticating
Entity Hash1(vB$$z7#%)
Hash1
Optional
Q-PUDID
Emulator
Device
Auth Entity
Generated
Hash1
(vB$$z7#%)
Q-PUDID Application: Authenticating
Entity
End User and his Device is Authenticated
Escrowed
Database of
Q-PUDID
Emulator
Escrowed
Database of
Login/Password
Hash
Q-PUDID ID
Temporary storage of
Authenticating Entity’s
Digital Signature
Digital Signature
of Auth Entity
Hash0
Client
Generated
Hash1(vB$$z7#%)
Passwor/
Login
(Hash0)
Does it
match?
“Cloned”
Q-PUDID
Device/s
13
Potential Q-PUDID Application
Q-PUDID Applications:
 IoT Authentication (machines that can uniquely identify other machines)
 Car remote and garage door opener
 Secure drone management
 Smart/Secure Meter
 Multi-media control
 Etc.
 Human-Machine Authentication
 Secure facilities
 Computing devices and IT resources
 Point of Sale (POS) system
 Mobile ATM
 Authentication for wearable technologies (Smart Watch, iPhones)
 Gaming console/s
 Release of media control
 Etc.
14
15
Conclusion:
 Integrated Security Facility (Technology demonstration lab)
 Looking for potential CRADA partnership
 Sandia owned Background Intellectual Properties (e.g., Ephemeral
Biometrics*, PUDID, Q-PUDID, Auto-registration*)
 FBO Posting
 http://www.sandia.gov/working_with_sandia/agreements/crada/opportu
nities.html or
 https://www.fbo.gov/spg/DOE/SNL/SN/15_440/listing.html
 POC: Sung (Peter) Choi
– schoi@sandia.gov
– Office Phone: (505)-284-3618
 References
 S. Choi and D. Zage, “Addressing Insider Threat using ‘Where You Are’ as Fourth Factor
Authentication,” in IEEE International Carnahan Conference on Security Technology (ICCST), 2012
 S. Choi and D. Zage, “Ephemeral Biometrics: What are they and what do they solve?” in IEEE
International Carnahan Conference on Security Technology (ICCST), 2013
* Patent pending
16
Questions?
Active Drone Management
 Unmanned Aerial Vehicles
 Rising military and private industry use
 Seal the information they contain
 Sabotage them
 Commandeer them
 RF-enabled cyber attacks have been demonstrated
 Q-PUDID application to drone management
 Preconfigured Cognitive Command & Control (P3C)
 Mutual active authentication between ground station (GS) and UAVs
 Every command from GS is actively authenticated
 Q-PUDID, an exploit-resistant authentication and C&C
17
Smart Meter
 Miniature computing device that measures the consumption
of utilities and communicates back to service provider via
 Wireless mesh network
 Power line networking
 Connection to the user’s own Internet service
 Unmanned, unmonitored utility device
 Lack of authentication service  IoT authentication problem
 Lack of data integrity and confidentiality privacy, data tampering
 Susceptible to remote cyber attacks
 Meter tampering
 Man-in-the-middle
 Invasion of privacy
 Q-PUDID Implementation
 Replace human “what you know” factor with meter GPS location data
and time 18
19

More Related Content

Viewers also liked

Viewers also liked (8)

Finding Needles in the Haystacks - Genetic Diagnosis in Diabetes
Finding Needles in the Haystacks - Genetic Diagnosis in DiabetesFinding Needles in the Haystacks - Genetic Diagnosis in Diabetes
Finding Needles in the Haystacks - Genetic Diagnosis in Diabetes
 
Objetos tecnologicos hernández hamilton
Objetos tecnologicos hernández hamiltonObjetos tecnologicos hernández hamilton
Objetos tecnologicos hernández hamilton
 
Htc(宏達電)
Htc(宏達電)Htc(宏達電)
Htc(宏達電)
 
Sistema de tierra
Sistema de tierraSistema de tierra
Sistema de tierra
 
Electrostatics Lecture
Electrostatics LectureElectrostatics Lecture
Electrostatics Lecture
 
Luthfi haliyatun nisa'
Luthfi haliyatun nisa'Luthfi haliyatun nisa'
Luthfi haliyatun nisa'
 
Opencampus201503
Opencampus201503Opencampus201503
Opencampus201503
 
Lock
LockLock
Lock
 

Similar to Physically Unclonable Digital ID

Physically Unclonable Digital ID
Physically Unclonable Digital IDPhysically Unclonable Digital ID
Physically Unclonable Digital IDPeter Choi
 
Privacy-Preserving Data Analysis, Adria Gascon
Privacy-Preserving Data Analysis, Adria GasconPrivacy-Preserving Data Analysis, Adria Gascon
Privacy-Preserving Data Analysis, Adria GasconUlrik Lyngs
 
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...Mahmud Hossain
 
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET Journal
 
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...Clare Nelson, CISSP, CIPP-E
 
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...Mahmud Hossain
 
Securing IoT medical devices
Securing IoT medical devicesSecuring IoT medical devices
Securing IoT medical devicesBenjamin Biwer
 
10th SANS ICS Security Summit Project SHINE Presentation
10th SANS ICS Security Summit Project SHINE Presentation10th SANS ICS Security Summit Project SHINE Presentation
10th SANS ICS Security Summit Project SHINE PresentationBob Radvanovsky
 
CIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open StandardsCIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open StandardsCloudIDSummit
 
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...Mark Underwood
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatDuo Security
 
Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSecurity for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSHASHANK WANKHADE
 
Ijricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjripublishers Ijri
 
Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009Jason Shen
 
Internet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsInternet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsGeorge Fletcher
 
Best practices for connecting medical devices to the cloud
Best practices for connecting medical devices to the cloudBest practices for connecting medical devices to the cloud
Best practices for connecting medical devices to the cloudGuy Vinograd ☁
 
Identity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud StorageIdentity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud Storage1crore projects
 
Cps security bitsworkshopdec15.2012 (1)
Cps security bitsworkshopdec15.2012 (1)Cps security bitsworkshopdec15.2012 (1)
Cps security bitsworkshopdec15.2012 (1)shanshicn
 

Similar to Physically Unclonable Digital ID (20)

Physically Unclonable Digital ID
Physically Unclonable Digital IDPhysically Unclonable Digital ID
Physically Unclonable Digital ID
 
Privacy-Preserving Data Analysis, Adria Gascon
Privacy-Preserving Data Analysis, Adria GasconPrivacy-Preserving Data Analysis, Adria Gascon
Privacy-Preserving Data Analysis, Adria Gascon
 
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
 
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
 
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
 
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
 
Securing IoT medical devices
Securing IoT medical devicesSecuring IoT medical devices
Securing IoT medical devices
 
10th SANS ICS Security Summit Project SHINE Presentation
10th SANS ICS Security Summit Project SHINE Presentation10th SANS ICS Security Summit Project SHINE Presentation
10th SANS ICS Security Summit Project SHINE Presentation
 
CIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open StandardsCIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open Standards
 
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
 
IOT Forensics
IOT ForensicsIOT Forensics
IOT Forensics
 
Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSecurity for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time password
 
Ijricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individuality
 
Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009
 
Internet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsInternet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open Standards
 
i-Secure - 3FA Smart Lock
i-Secure - 3FA Smart Locki-Secure - 3FA Smart Lock
i-Secure - 3FA Smart Lock
 
Best practices for connecting medical devices to the cloud
Best practices for connecting medical devices to the cloudBest practices for connecting medical devices to the cloud
Best practices for connecting medical devices to the cloud
 
Identity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud StorageIdentity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud Storage
 
Cps security bitsworkshopdec15.2012 (1)
Cps security bitsworkshopdec15.2012 (1)Cps security bitsworkshopdec15.2012 (1)
Cps security bitsworkshopdec15.2012 (1)
 

Recently uploaded

怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证tufbav
 
Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)amitlee9823
 
Call Girls Pimple Saudagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Pimple Saudagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Pimple Saudagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Pimple Saudagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Shikrapur Call Girls Most Awaited Fun 6297143586 High Profiles young Beautie...
Shikrapur Call Girls Most Awaited Fun  6297143586 High Profiles young Beautie...Shikrapur Call Girls Most Awaited Fun  6297143586 High Profiles young Beautie...
Shikrapur Call Girls Most Awaited Fun 6297143586 High Profiles young Beautie...tanu pandey
 
Just Call Vip call girls daman Escorts ☎️9352988975 Two shot with one girl (d...
Just Call Vip call girls daman Escorts ☎️9352988975 Two shot with one girl (d...Just Call Vip call girls daman Escorts ☎️9352988975 Two shot with one girl (d...
Just Call Vip call girls daman Escorts ☎️9352988975 Two shot with one girl (d...gajnagarg
 
Top Rated Pune Call Girls Ravet ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Ravet ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Ravet ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Ravet ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in DammamAbortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammamahmedjiabur940
 
Call Girls In RT Nagar ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In RT Nagar ☎ 7737669865 🥵 Book Your One night StandCall Girls In RT Nagar ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In RT Nagar ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
➥🔝 7737669865 🔝▻ Muzaffarpur Call-girls in Women Seeking Men 🔝Muzaffarpur🔝 ...
➥🔝 7737669865 🔝▻ Muzaffarpur Call-girls in Women Seeking Men  🔝Muzaffarpur🔝  ...➥🔝 7737669865 🔝▻ Muzaffarpur Call-girls in Women Seeking Men  🔝Muzaffarpur🔝  ...
➥🔝 7737669865 🔝▻ Muzaffarpur Call-girls in Women Seeking Men 🔝Muzaffarpur🔝 ...amitlee9823
 
Call Girls Chikhali Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chikhali Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Chikhali Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chikhali Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Just Call Vip call girls godhra Escorts ☎️9352988975 Two shot with one girl (...
Just Call Vip call girls godhra Escorts ☎️9352988975 Two shot with one girl (...Just Call Vip call girls godhra Escorts ☎️9352988975 Two shot with one girl (...
Just Call Vip call girls godhra Escorts ☎️9352988975 Two shot with one girl (...gajnagarg
 
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...MOHANI PANDEY
 
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...amitlee9823
 
Escorts Service Daryaganj - 9899900591 College Girls & Models 24/7
Escorts Service Daryaganj - 9899900591 College Girls & Models 24/7Escorts Service Daryaganj - 9899900591 College Girls & Models 24/7
Escorts Service Daryaganj - 9899900591 College Girls & Models 24/7shivanni mehta
 
Deira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort Girls
Deira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort GirlsDeira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort Girls
Deira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort GirlsEscorts Call Girls
 
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...Call Girls in Nagpur High Profile
 

Recently uploaded (20)

怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
 
Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 
Call Girls Pimple Saudagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Pimple Saudagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Pimple Saudagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Pimple Saudagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Shikrapur Call Girls Most Awaited Fun 6297143586 High Profiles young Beautie...
Shikrapur Call Girls Most Awaited Fun  6297143586 High Profiles young Beautie...Shikrapur Call Girls Most Awaited Fun  6297143586 High Profiles young Beautie...
Shikrapur Call Girls Most Awaited Fun 6297143586 High Profiles young Beautie...
 
Just Call Vip call girls daman Escorts ☎️9352988975 Two shot with one girl (d...
Just Call Vip call girls daman Escorts ☎️9352988975 Two shot with one girl (d...Just Call Vip call girls daman Escorts ☎️9352988975 Two shot with one girl (d...
Just Call Vip call girls daman Escorts ☎️9352988975 Two shot with one girl (d...
 
Top Rated Pune Call Girls Ravet ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Ravet ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Ravet ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Ravet ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in DammamAbortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
 
Call Girls In RT Nagar ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In RT Nagar ☎ 7737669865 🥵 Book Your One night StandCall Girls In RT Nagar ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In RT Nagar ☎ 7737669865 🥵 Book Your One night Stand
 
(INDIRA) Call Girl Napur Call Now 8617697112 Napur Escorts 24x7
(INDIRA) Call Girl Napur Call Now 8617697112 Napur Escorts 24x7(INDIRA) Call Girl Napur Call Now 8617697112 Napur Escorts 24x7
(INDIRA) Call Girl Napur Call Now 8617697112 Napur Escorts 24x7
 
➥🔝 7737669865 🔝▻ Muzaffarpur Call-girls in Women Seeking Men 🔝Muzaffarpur🔝 ...
➥🔝 7737669865 🔝▻ Muzaffarpur Call-girls in Women Seeking Men  🔝Muzaffarpur🔝  ...➥🔝 7737669865 🔝▻ Muzaffarpur Call-girls in Women Seeking Men  🔝Muzaffarpur🔝  ...
➥🔝 7737669865 🔝▻ Muzaffarpur Call-girls in Women Seeking Men 🔝Muzaffarpur🔝 ...
 
Call Girls Chikhali Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chikhali Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Chikhali Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chikhali Call Me 7737669865 Budget Friendly No Advance Booking
 
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
 
Just Call Vip call girls godhra Escorts ☎️9352988975 Two shot with one girl (...
Just Call Vip call girls godhra Escorts ☎️9352988975 Two shot with one girl (...Just Call Vip call girls godhra Escorts ☎️9352988975 Two shot with one girl (...
Just Call Vip call girls godhra Escorts ☎️9352988975 Two shot with one girl (...
 
Abortion pills in Jeddah |+966572737505 | Get Cytotec
Abortion pills in Jeddah |+966572737505 | Get CytotecAbortion pills in Jeddah |+966572737505 | Get Cytotec
Abortion pills in Jeddah |+966572737505 | Get Cytotec
 
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...
 
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
 
Escorts Service Daryaganj - 9899900591 College Girls & Models 24/7
Escorts Service Daryaganj - 9899900591 College Girls & Models 24/7Escorts Service Daryaganj - 9899900591 College Girls & Models 24/7
Escorts Service Daryaganj - 9899900591 College Girls & Models 24/7
 
Deira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort Girls
Deira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort GirlsDeira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort Girls
Deira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort Girls
 
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...
 
(ISHITA) Call Girls Service Aurangabad Call Now 8617697112 Aurangabad Escorts...
(ISHITA) Call Girls Service Aurangabad Call Now 8617697112 Aurangabad Escorts...(ISHITA) Call Girls Service Aurangabad Call Now 8617697112 Aurangabad Escorts...
(ISHITA) Call Girls Service Aurangabad Call Now 8617697112 Aurangabad Escorts...
 

Physically Unclonable Digital ID

  • 1. Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy’s National Nuclear Security Administration under contract DE-AC04-94AL85000. Physically Unclonable Digital ID* Peter S. Choi, Ph.D., CISSP, CSSLP David Zage, Ph.D. Yung Ryn Choe, Ph.D. Brent Wasilow * U.S. Provisional Patent Application No. 62/175,753, filed June 15, 2015, entitled “Methods and Systems for Authenticating Identity”
  • 2. PUF  Physically Unclonable Function (PUF)  Energy flow pattern, uniquely tied to randomness inherent in the physical systems  “Fingerprint” of physical object  PUF uses (challenge, response) pair as protected secrets  Challenge component of the PUF only exists when device is used  PUF responses are difficult to spoof, clone, or predict  PUF’s intrinsic properties can be used as:  Random number generators  Device authentication  Encryption  Etc.  IC Examples: uncontrolled variability of the microfabrication processes  Arbiter  Ring Oscillator  Static Random Access Memory (SRAM) 2
  • 3. Why isn’t PUF utilized more?  PUF phenomena arises from nano-scale diversity  Current manufacturing process do not have the control at the nano- scale  Nano-scale physical phenomena, highly susceptible to output noise, requiring mathematical model for error-correction  PUF often requires storing database of challenge-response pairs (CRPs) corresponding to the PUF component  If the response matches the stored response, the lock opens  In this PUF model, if CRP can be used only once, eventually running out of CRPs  Manufacturer has the access to CRP database  ID is permanent  Susceptible to modeling and cloning attacks  Access to device, access to challenge, response pair (CRP) behaviors  Have access to PUF’s “response” pair 3
  • 4. Why isn’t PUF used more? (Cont.)  For consistent PUF behavior (complex error-correction algorithm is needed)  Needs “purified” energy source (e.g., homogenous current, voltage or light source)  Needs consistent environmental conditions (e.g. temperature, pressure, humidity)  Difficult to define collision space with scalable deployment  Billions of device and billions of unique CRPs  CRP behavior is usually very complex and difficult to pin-down  PUFs are permanent, cannot be modified to fit human ID  Manufacturers have access to device ID  Confidentiality of CRP is “intrinsically” compromised  Securing PUF CRPs from manufacturing to deployment can be challenging and expensive 4
  • 5. Quasi-Physically Unclonable Digital ID (Q-PUDID)  Process that integrates series of hashing algorithms and combining it with tamper resistant hardware functions to produce “unclonable, dynamic” digital ID  “unclonable”: Near impossible or cost prohibitive to repeat  “dynamic”: based on unique energy-material interaction behavior  Uses macroscopic phenomena, instead of nanoscale phenomena 5
  • 6. Innovation in Q-PUDID  Emulates PUF functionality  Macroscopic, physical phenomena  Mathematically reproducible  Tamper resistant technology  Unique, uncompromisable device ID  Discrete application of hash functions  Dynamic ID  Q-PUDID Authentication protocol  Extremely “protocol light”  Cheap to produce, hard to replicate  Pluggable and modular  Authentication based on novel, unclonable digital ID  Does not use Confidentiality (e.g., encryption)  Enables “true” two form factor authentication  ID is non-static  Digital ID is grounded in physical world 6
  • 7. Q-PUDID  Cyber identity, anchored to unique physical device, intentionally made very hard to replicate (e.g., tamper resistant)  No possibility of a mass breach (tokenized authentication on steroid)  Criminals must steal your device and your credential (password/biometrics)  2 Factor Authentication  Identity is verified through dynamic, non-static authentication mechanism  Q-PUDID is scalable  More secure but less cumbersome  Identity collision probability, mathematically scaled according to needs 7
  • 9. Example of Quasi-PUF Device  Random pattern is burned into Q-PUDID device  For bank application, assume time sensitive hand signature is tied to human ID  This “random pattern” is physically stored under tamper resistant hardware such as Smart Card chip  This “random pattern” is designed to interact with in-flow of data and modifies the data unique to this “random pattern”  This modified data is put through message digest function producing digital signature validating the person’s ID and the Q-PUDID hardware 9 X X Y Y X Y Time 1 Time 2 Time 3 Unrepeatable, one-time hand signature is captured and used as unique physical device pattern, “burned” into the black box function.
  • 10. Q-PUDID Dispenser End User’s Hand SignatureSigns & Registers For Q-PUDID Device Hash1 Quasi-PUDID Device Activation Process Authenticating Entity’s Q-PUDID Device Signature Escrow Q-PUDID Device* * End user’s signature is burned into Q-PUDID device and by design, it is never read by any external inquiries 10
  • 11. 11 10010 00010 10000 11110 10101 10011 Digital Signature Time stamp/nonce , Public Cert $aBqz#6@ Dynamic datainput Q-PUDID Digitizer SHA2 Data Input Interface Hidden Physical Process Analog Digital Converter Message Digest/Hash Engine User ID Time/Nonce Device Quasi-PUDID Device
  • 12. Q-PUDID Device (Digital) 12 Message Digest** Engine Passwd Hash Tamper Resistant, Q-PUDID Processor Human Signature/ Device Specific Random Pattern Password Hasher** Digital Signature of Auth Entity/Nonce/ Time Stamp Dynamic Data User Name Password **Message Digest and Hash functions are used inter-changeably $aBqz#6@ 2aZ% 12:30:21 PM 12:30:21 PM, 2aZ% $aBqz#6@ Q-PUDID Modified Data Message Digest** Engine Dynamic, time Dependent, Digital Signature of Device and Human ID Hash1 Digital Signature sent to Authenticating Entity Hash1(vB$$z7#%) Hash1 Optional
  • 13. Q-PUDID Emulator Device Auth Entity Generated Hash1 (vB$$z7#%) Q-PUDID Application: Authenticating Entity End User and his Device is Authenticated Escrowed Database of Q-PUDID Emulator Escrowed Database of Login/Password Hash Q-PUDID ID Temporary storage of Authenticating Entity’s Digital Signature Digital Signature of Auth Entity Hash0 Client Generated Hash1(vB$$z7#%) Passwor/ Login (Hash0) Does it match? “Cloned” Q-PUDID Device/s 13
  • 14. Potential Q-PUDID Application Q-PUDID Applications:  IoT Authentication (machines that can uniquely identify other machines)  Car remote and garage door opener  Secure drone management  Smart/Secure Meter  Multi-media control  Etc.  Human-Machine Authentication  Secure facilities  Computing devices and IT resources  Point of Sale (POS) system  Mobile ATM  Authentication for wearable technologies (Smart Watch, iPhones)  Gaming console/s  Release of media control  Etc. 14
  • 15. 15 Conclusion:  Integrated Security Facility (Technology demonstration lab)  Looking for potential CRADA partnership  Sandia owned Background Intellectual Properties (e.g., Ephemeral Biometrics*, PUDID, Q-PUDID, Auto-registration*)  FBO Posting  http://www.sandia.gov/working_with_sandia/agreements/crada/opportu nities.html or  https://www.fbo.gov/spg/DOE/SNL/SN/15_440/listing.html  POC: Sung (Peter) Choi – schoi@sandia.gov – Office Phone: (505)-284-3618  References  S. Choi and D. Zage, “Addressing Insider Threat using ‘Where You Are’ as Fourth Factor Authentication,” in IEEE International Carnahan Conference on Security Technology (ICCST), 2012  S. Choi and D. Zage, “Ephemeral Biometrics: What are they and what do they solve?” in IEEE International Carnahan Conference on Security Technology (ICCST), 2013 * Patent pending
  • 17. Active Drone Management  Unmanned Aerial Vehicles  Rising military and private industry use  Seal the information they contain  Sabotage them  Commandeer them  RF-enabled cyber attacks have been demonstrated  Q-PUDID application to drone management  Preconfigured Cognitive Command & Control (P3C)  Mutual active authentication between ground station (GS) and UAVs  Every command from GS is actively authenticated  Q-PUDID, an exploit-resistant authentication and C&C 17
  • 18. Smart Meter  Miniature computing device that measures the consumption of utilities and communicates back to service provider via  Wireless mesh network  Power line networking  Connection to the user’s own Internet service  Unmanned, unmonitored utility device  Lack of authentication service  IoT authentication problem  Lack of data integrity and confidentiality privacy, data tampering  Susceptible to remote cyber attacks  Meter tampering  Man-in-the-middle  Invasion of privacy  Q-PUDID Implementation  Replace human “what you know” factor with meter GPS location data and time 18
  • 19. 19

Editor's Notes

  1. Q-PUDID Application: End User & His Device