Solving cryptography’s toughest challenge using a key that doesn’t exist

source: https://cdn.technologyreview.com/i/images/quantumexplainer3.2-01.jpg?sw=3000

The System

The key

Physical Unclonable Functions

Application

PUF based Authentication Protocol for IoT

Public Physical Unclonable Function

References

Tech enthusiast | Innovation Hungry | Problem Solver | https://www.linkedin.com/in/adeeb-abdul-salam-416826138