Preprint Article Version 2 Preserved in Portico This version is not peer-reviewed

A Novel Security System Using a Physical Unclonable Framework With Modified Elliptic Curve Cryptography Algorithm

Version 1 : Received: 13 June 2024 / Approved: 17 June 2024 / Online: 18 June 2024 (11:55:19 CEST)
Version 2 : Received: 24 July 2024 / Approved: 25 July 2024 / Online: 26 July 2024 (05:58:17 CEST)

How to cite: Altaher, A. A Novel Security System Using a Physical Unclonable Framework With Modified Elliptic Curve Cryptography Algorithm. Preprints 2024, 2024061179. https://doi.org/10.20944/preprints202406.1179.v2 Altaher, A. A Novel Security System Using a Physical Unclonable Framework With Modified Elliptic Curve Cryptography Algorithm. Preprints 2024, 2024061179. https://doi.org/10.20944/preprints202406.1179.v2

Abstract

A Physical Unclonable Framework (PUF) is a detached hardware component or, the structural arrangement of hardware that provides natural variations in the physical parts of semiconductor devices to generate unique and unpredictable identifiers based on challenging-to-replicate. In this case, PUFs are giving us a tool to utilise these variations to create an unclonable identifier for your device. PUFs generate a response or a unique pattern based on the physical characteristics of the device, and this response is difficult to predict or duplicate. This study aims to introduce a PUK device to provide security research on the Internet of Things technology. The elliptic curve cryptography algorithm was modified with an advanced equation to calculate a private key and K value. In this study, a PUF device will be employed with a modified elliptic curve cryptography algorithm on a novel security system to be used in current and future communication technology.

Keywords

PUF; Improved PUF; ECC; security; Cybersecurity; Authentication; Authorization; Encryption; Decryption

Subject

Engineering, Other

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.