PUFs, TRNGs, and Cryptography

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/32

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:42 PM on 2/27/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

33 Terms

1
New cards

Why is traditional digital key storage vulnerable?

Non-volatile memory can be attacked, leading to exposure of secret keys.

2
New cards

What are the main security goals in cryptographic systems?

Authentication (no spoofing), Data Integrity (no alteration), Privacy (no eavesdropping).

3
New cards

What are common attacker goals in hardware security?

Extracting crypto keys, learning secret algorithms, modifying stored data, and bypassing security measures.

4
New cards

Why is software-only protection insufficient?

Software protection does not prevent physical attacks, such as invasive memory extraction.

5
New cards

What is the difference between symmetric and asymmetric cryptography?

Symmetric uses the same key for encryption and decryption, while asymmetric uses different keys.

6
New cards

What are one-way functions, and why are they important?

Functions that are easy to compute but hard to reverse, essential for encryption and hashing.

7
New cards

What is a Physical Unclonable Function (PUF)?

A hardware-based function that generates unique, unpredictable outputs based on physical variations.

8
New cards

How do PUFs improve security?

They generate keys on demand, eliminating the need for stored digital secrets.

9
New cards

What is an example of a silicon-based PUF?

Silicon delay-based PUFs exploit manufacturing variations in transistor delays.

10
New cards

How do Ring Oscillator (RO) PUFs work?

They use variations in oscillation frequency to generate unique responses.

11
New cards

How can PUFs be used for authentication?

A system can challenge a PUF with an input and verify the response against a stored database.

12
New cards

Why are PUFs suitable for secure key storage?

Keys are generated dynamically rather than stored, making extraction attacks difficult.

13
New cards

What are common attacks on PUFs?

Machine learning attacks, fault injection attacks, and environmental variation effects.

14
New cards

How can measurement noise affect PUF reliability?

Temperature and voltage fluctuations can alter PUF responses, making them less stable.

15
New cards

What is a TRNG?

A system that generates random numbers from unpredictable physical processes.

16
New cards

What are common entropy sources for TRNGs?

Thermal noise, radioactive decay, and semiconductor variations.

17
New cards

What is clock jitter, and how is it used in TRNGs?

Variations in clock timing caused by noise, used to create randomness.

18
New cards

Why are TRNGs important for cryptographic security?

They generate unpredictable values for encryption keys, session tokens, and digital signatures.

19
New cards

How do TRNGs differ from Pseudo-Random Number Generators (PRNGs)?

TRNGs use physical randomness, while PRNGs use deterministic algorithms with a seed.

20
New cards

What are key properties of cryptographic hash functions?

Pre-image resistance, collision resistance, and the avalanche effect.

21
New cards

How are hash functions used in security?

They secure passwords, verify data integrity, and generate digital signatures.

22
New cards

What is the difference between DES and AES?

AES is more secure, uses larger key sizes (128, 192, 256-bit), and replaces the outdated DES standard.

23
New cards

What are the four main steps in AES encryption?

SubBytes, ShiftRows, MixColumns, AddRoundKey.

24
New cards

What is cryptography?

The practice of securing information by transforming it into a format that is unreadable to unauthorized users.

25
New cards

What is key management in cryptography?

The management of cryptographic keys, including their generation, distribution, and storage.

26
New cards

What does SSL stand for?

Secure Sockets Layer, a protocol for securing communications over a computer network.

27
New cards

What is a digital signature?

A mathematical scheme for verifying the authenticity and integrity of a message or document.

28
New cards

What is the purpose of encryption?

To protect information by converting it into a code to prevent unauthorized access.

29
New cards

What is the role of a hash function in security?

To convert data into a fixed-size string of characters, which is typically a hash value.

30
New cards

What are block ciphers?

Encryption algorithms that process fixed-size blocks of data, commonly used in symmetric key cryptography.

31
New cards

What is a security token?

A physical device or software that generates a unique code for user authentication.

32
New cards

What does the term 'man-in-the-middle attack' mean?

An attack where a third party intercepts and possibly alters the communication between two parties.

33
New cards

What is the significance of the RSA algorithm?

A widely used asymmetric cryptographic algorithm that relies on the difficulty of factoring large integers.