Garrett, Michael Logan (2022) Experimental performance analysis of physically unclonable session key protocol for zero-trust environments. Masters thesis, Northern Arizona University.
Text
Garrett_2022_experimental_performance_analysis_physically_unclonable_s.pdf - Published Version Restricted to Repository staff only Download (582kB) | Request a copy |
Abstract
This article describes a protocol which mitigates the possibility of fraudulent server-side man-in-the-middle attacks on client-server architectures by exploiting physically unique properties of hardware memory devices known as Physically Unclonable Functions (PUFs). We then provide an analysis of the performance of an experimental implementation of the protocol using two different types of PUF in many different configurations, followed by a discussion of the conclusions and practical considerations implied by the preceding analysis.
Item Type: | Thesis (Masters) |
---|---|
Publisher’s Statement: | © Copyright is held by the author. Digital access to this material is made possible by the Cline Library, Northern Arizona University. Further transmission, reproduction or presentation of protected items is prohibited except with permission of the author. |
Keywords: | hardware cybersecurity; man-in-the-middle; puf; server; zero-trust |
Subjects: | Q Science > QA Mathematics Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
NAU Depositing Author Academic Status: | Student |
Department/Unit: | Graduate College > Theses and Dissertations College of Engineering, Informatics, and Applied Sciences > School of Informatics, Computing, and Cyber Systems |
Date Deposited: | 06 Jun 2023 16:20 |
Last Modified: | 06 Jun 2023 16:20 |
URI: | https://openknowledge.nau.edu/id/eprint/5960 |
Actions (login required)
IR Staff Record View |
Downloads
Downloads per month over past year