The Authentication and Key Management Method based on PUF for Secure USB

Recently, a storage media is becoming smaller and storage capacity is also becoming larger than before. However, important data was leaked through a small storage media. To solve these serious problem, many security companies manufacture secure USBs with secure function, such as data encryption, user authentication, not copying data, and management system for secure USB, etc. But various attacks, such as extracting flash memory from USBs, password hacking or memory dump, and bypassing fingerprint authentication, have appeared. Therefore, security techniques related to secure USBs have to concern many threats for them. The basic components for a secure USB are secure authentication and data encryption techniques. Though existing secure USBs applied password based user authentication, it is necessary to develop more secure authentication because many threats have appeared. And encryption chipsets are used for data encryption however we also concern key

[1]  Minho Kim,et al.  Vulnerability Analysis Method of Software-based Secure USB , 2012 .

[2]  Seong-Moo Yoo,et al.  An AES crypto chip using a high-speed parallel pipelined architecture , 2005, Microprocess. Microsystems.

[3]  Dongho Won,et al.  Analysis on Vulnerability of Secure USB Flash Drive and Development Protection Profile based on Common Criteria Version 3.1 , 2007 .

[4]  Minho Park,et al.  OTP-Based Transaction Verification Protocol Using PUFs , 2013 .

[5]  Souhwan Jung,et al.  HRP: A HMAC-based RFID mutual authentication protocol using PUF , 2013, The International Conference on Information Networking 2013 (ICOIN).

[6]  Im-Yeong Lee,et al.  A Study on Security Solution for USB Flash Drive , 2010 .

[7]  Im-Yeong Lee,et al.  The Study on The Security Solutions of USB Memory , 2009, Proceedings of the 4th International Conference on Ubiquitous Information Technologies & Applications.

[8]  G. Edward Suh,et al.  Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.