SYSTEM FOR GENERATING A CRYPTOGRAPHIC KEY FROM A MEMORY USED AS A PHYSICALLY UNCLONABLE FUNCTION

    公开(公告)号:EP2904732B1

    公开(公告)日:2018-11-28

    申请号:EP13759256.4

    申请日:2013-09-10

    申请人: Intrinsic ID B.V.

    IPC分类号: H04L9/08

    摘要: An electronic system 100 for generating a cryptographic key, the system comprising a memory 110 used as a physically unclonable function, the memory being writable, volatile and configured such that upon each powering-up of the memory the memory settles into a memory content which depends upon at least partially random physical characteristics of the memory, the memory being accessible through a memory interface, and a key derivation unit 150 configured to derive the cryptographic key from the memory content into which the memory settled, wherein the electronic system for generating a cryptographic key further comprises, a memory read-out unit connected to the memory through the memory interface and to the key derivation unit, the memory read-out unit comprising an address scrambler 140 for retrieving the memory content over the memory interface in a scrambled order.

    METHOD, APPARATUS, AND SYSTEM FOR IDENTITY AUTHENTICATION

    公开(公告)号:EP3259870A4

    公开(公告)日:2018-03-28

    申请号:EP16752796

    申请日:2016-02-05

    IPC分类号: H04L9/08

    摘要: An identity authentication method for a quantum key distribution process includes selecting, by a sender, preparation bases of an identity authentication bit string in accordance with a preset basis vector selection rule; sending, by a sender, quantum states of the identity authentication bit string and quantum states of a randomly generated key bit string by using different wavelengths. The identity authentication bit string is interleaved in the key bit string at a random position and with a random length. The method further includes measuring, by a receiver, the received quantum states in the quantum state information in accordance with the different wavelengths and measurement bases selected according to the preset basis vector selection rule to obtain identity authentication information from the measurement of the identity authentication bit string; and determining, by the receiver, whether the identity authentication information obtained through the measurement corresponds with the preset basis vector selection rule.