Bummer! This is just a preview. You need to be signed in with an account to view the entire instruction.
Well done!
You have completed (UPI) Chapter 16: Emerging Technologies in Cybersecurity!
You have completed (UPI) Chapter 16: Emerging Technologies in Cybersecurity!
Instruction
16.3.2 PKI with Network of PUFs
The use of networks of PUFs (Physical Unclonable Functions) can mitigate the vulnerabilities of PKIs. PUF technology exploits variations created during fabrication to differentiate each device from all others, acting as a hardware "fingerprint". Solutions based on PUFs embedded in the hardware of each node mitigate the risk of an opponent reading the keys stored in non-volatile memories. PKI ...