Bummer! This is just a preview. You need to be signed in with an account to view the entire instruction.
- 16.4.1 PUF-Based Key Distribution for LWE Lattice Cryptography
- 16.4.2 PKI Architecture with PUF-Based Key Distribution and LWE
- 16.4.3 PUF-Based Key Distribution for LWR Lattice Cryptography
- 16.4.4 PUF-Based Key Distribution for NTRU Lattice Cryptography
- 16.4.5 PUF-Based Key Distribution for Code-Based Cryptography
- Quiz 16.4 5 questions
Well done!
You have completed (UPI) Chapter 16: Emerging Technologies in Cybersecurity!
Instruction
16.4.4 PUF-Based Key Distribution for NTRU Lattice Cryptography
<style> sub { vertical-align: sub; font-size: 70%; } sup { vertical-align: super; font-size: 70%; } </style>
The protocol for generating key pairs from PUFs for NTRU cryptography is similar to the one presented in Section 4.1 for LWE, as shown in Figure 8. In this method, the only source of randomness is the PUF Seed K, used to compute both the public key 𝑃...