Moonshine: An Online Randomness Distiller for Zero-Involvement Authentication

by   Jack West, et al.

Context-based authentication is a method for transparently validating another device's legitimacy to join a network based on location. Devices can pair with one another by continuously harvesting environmental noise to generate a random key with no user involvement. However, there are gaps in our understanding of the theoretical limitations of environmental noise harvesting, making it difficult for researchers to build efficient algorithms for sampling environmental noise and distilling keys from that noise. This work explores the information-theoretic capacity of context-based authentication mechanisms to generate random bit strings from environmental noise sources with known properties. Using only mild assumptions about the source process's characteristics, we demonstrate that commonly-used bit extraction algorithms extract only about 10 We present an efficient algorithm to improve the quality of keys generated by context-based methods and evaluate it on real key extraction hardware. Moonshine is a randomness distiller which is more efficient at extracting bits from an environmental entropy source than existing methods. Our techniques nearly double the quality of keys as measured by the NIST test suite, producing keys that can be used in real-world authentication scenarios.


Technical Report on a Virtual CTAP2 WebAuthn Authenticator

Even though passwordless authentication to online accounts offers greate...

The entropy of keys derived from laser speckle

Laser speckle has been proposed in a number of papers as a high-entropy ...

VoltKey: Using Power Line Noise for Zero-Involvement Pairing and Authentication (Demo Abstract)

We present VoltKey, a method that transparently generates secret keys fo...

Private Authentication: Optimal Information Theoretic Schemes

The main security service in the connected world of cyber physical syste...

Novel Randomized Placement for FPGA Based Robust ROPUF with Improved Uniqueness

The physical unclonable functions (PUF) are used to provide software as ...

SmartKex: Machine Learning Assisted SSH Keys Extraction From The Heap Dump

Digital forensics is the process of extracting, preserving, and document...

Semi-Assisted Signal Authentication based on Galileo ACAS

A GNSS signal authentication concept named semi-assisted authentication ...