Authentication and key distribution protocol based on Diffie-Hellman algorithm and physically unclonable functions
Yakovlev V.A. Satybaldina D.Z. Egamberdiyev E. Seitkulov Y.
April 2024Universitas Ahmad Dahlan
Telkomnika (Telecommunication Computing Electronics and Control)
2024#22Issue 2290 - 301 pp.
Based on the modified Diffie-Hellman (DH) protocol, a key distribution scheme between two correspondents over open communication channels is considered. The correspondents communicate through a trusted entity. An attacker can control the communication channels between the correspondents and the channels between the correspondents and the trusted authority (TA) and perform active attacks there, including a man-in-the-middle attack. DH authentication protocol using physically unclonable functions (PUF) is proposed. A formalized PUF model based on the class of universal hash functions is presented. Namely, it is proposed to use the class of strictly universal hash functions developed by Wegman and Carter. A polynomial dependence of the possible number of PPUs on the number of answers has been proven. Requirements for PPUs suitable for authentication systems are formulated. The protocol has been analyzed, and its security has been proved.
Authentication , Cellular communication networks , Diffie-Hellman , Key distribution , Physically unclonable function
Text of the article Перейти на текст статьи
Department of Secured Communications Systems, Faculty of Infocommunication Networks and Systems, Bonch-Bruevich Saint Petersburg State University of Telecommunications, Saint Petersburg, Saint Petersburg, Russian Federation
Department of Information Security, Faculty of Information Technologies, L.N. Gumilyov Eurasian National University, Astana, Kazakhstan
Department of Secured Communications Systems
Department of Information Security
10 лет помогаем публиковать статьи Международный издатель
Книга Публикация научной статьи Волощук 2026 Book Publication of a scientific article 2026