Показать сокращенную информацию

dc.contributor.authorYakovlev, Victor A.
dc.contributor.authorSatybaldina, Dina Zh.
dc.contributor.authorEgamberdiyev, Eldor
dc.contributor.authorSeitkulov, Yerzhan
dc.date.accessioned2024-12-09T04:43:44Z
dc.date.available2024-12-09T04:43:44Z
dc.date.issued2024
dc.identifier.issn1693-6930
dc.identifier.otherDOI: 10.12928/TELKOMNIKA.v22i2.25705
dc.identifier.urihttp://rep.enu.kz/handle/enu/19940
dc.description.abstractBased on the modified Diffie-Hellman (DH) protocol, a key distribution scheme between two correspondents over open communication channels is considered. The correspondents communicate through a trusted entity. An attacker can control the communication channels between the correspondents and the channels between the correspondents and the trusted authority (TA) and perform active attacks there, including a man-in-themiddle attack. DH authentication protocol using physically unclonable functions (PUF) is proposed. A formalized PUF model based on the class of universal hash functions is presented. Namely, it is proposed to use the class of strictly universal hash functions developed by Wegman and Carter. A polynomial dependence of the possible number of PPUs on the number of answers has been proven. Requirements for PPUs suitable for authentication systems are formulated. The protocol has been analyzed, and its security has been proved.ru
dc.language.isoenru
dc.publisherTelecommunication Computing Electronics and Controlru
dc.relation.ispartofseriesVol. 22, No. 2, April 2024, pp. 290~301;
dc.subjectAuthenticationru
dc.subjectCellular communicationru
dc.subjectnetworksru
dc.subjectDiffie-Hellmanru
dc.subjectKey distributionru
dc.subjectPhysically unclonable functionru
dc.titleAuthentication and key distribution protocol based on Diffie-Hellman algorithm and physically unclonable functionsru
dc.typeArticleru


Файлы в этом документе

Thumbnail

Данный элемент включен в следующие коллекции

Показать сокращенную информацию