Bummer! This is just a preview. You need to be signed in with an account to view the entire instruction.
- 16.4.1 PUF-Based Key Distribution for LWE Lattice Cryptography
- 16.4.2 PKI Architecture with PUF-Based Key Distribution and LWE
- 16.4.3 PUF-Based Key Distribution for LWR Lattice Cryptography
- 16.4.4 PUF-Based Key Distribution for NTRU Lattice Cryptography
- 16.4.5 PUF-Based Key Distribution for Code-Based Cryptography
- Quiz 16.4 5 questions
Well done!
You have completed (UPI) Chapter 16: Emerging Technologies in Cybersecurity!
Instruction
16.4.2 PKI Architecture with PUF-Based Key Distribution and LWE
<style> sub { vertical-align: sub; font-size: 70%; } sup { vertical-align: super; font-size: 70%; } </style>
The PUF-based key pair generation scheme with LWE cryptography, as presented in the previous section, can be integrated into a PKI securing a network of 𝑖 clients. Figure 7 shows two client devices communicating directly, either by exchanging secret keys t...