Moonshine: An Online Randomness Distiller for Zero-Involvement Authentication

04/29/2021
by   Jack West, et al.
0

Context-based authentication is a method for transparently validating another device's legitimacy to join a network based on location. Devices can pair with one another by continuously harvesting environmental noise to generate a random key with no user involvement. However, there are gaps in our understanding of the theoretical limitations of environmental noise harvesting, making it difficult for researchers to build efficient algorithms for sampling environmental noise and distilling keys from that noise. This work explores the information-theoretic capacity of context-based authentication mechanisms to generate random bit strings from environmental noise sources with known properties. Using only mild assumptions about the source process's characteristics, we demonstrate that commonly-used bit extraction algorithms extract only about 10 We present an efficient algorithm to improve the quality of keys generated by context-based methods and evaluate it on real key extraction hardware. Moonshine is a randomness distiller which is more efficient at extracting bits from an environmental entropy source than existing methods. Our techniques nearly double the quality of keys as measured by the NIST test suite, producing keys that can be used in real-world authentication scenarios.

READ FULL TEXT
research
08/09/2021

Technical Report on a Virtual CTAP2 WebAuthn Authenticator

Even though passwordless authentication to online accounts offers greate...
research
10/26/2007

The entropy of keys derived from laser speckle

Laser speckle has been proposed in a number of papers as a high-entropy ...
research
03/31/2020

VoltKey: Using Power Line Noise for Zero-Involvement Pairing and Authentication (Demo Abstract)

We present VoltKey, a method that transparently generates secret keys fo...
research
01/17/2019

Private Authentication: Optimal Information Theoretic Schemes

The main security service in the connected world of cyber physical syste...
research
09/12/2022

SmartKex: Machine Learning Assisted SSH Keys Extraction From The Heap Dump

Digital forensics is the process of extracting, preserving, and document...
research
06/07/2020

Novel Randomized Placement for FPGA Based Robust ROPUF with Improved Uniqueness

The physical unclonable functions (PUF) are used to provide software as ...
research
04/29/2022

Semi-Assisted Signal Authentication based on Galileo ACAS

A GNSS signal authentication concept named semi-assisted authentication ...

Please sign up or login with your details

Forgot password? Click here to reset