Physical Unclonable Functions using speckle patterns of perfect optical vortices

09/28/2021
by   Patnala Vanitha, et al.
0

Encryption techniques demonstrate a great deal of security when implemented in an optical system (such as holography) due to the inherent physical properties of light and the precision it demands. However, such systems have shown to be vulnerable during digital implementations under various crypt-analysis attacks. One of the primary reasons for this is the predictable nature of the security keys (i.e., simulated random keys) used in the encryption process. To alleviate, in this work, we are presenting a Physically Unclonable Functions (PUFs) for producing a robust security key for digital encryption systems. To note, a correlation function of the scattered perfect optical vortex (POV) beams is utilized to generate the encryption keys. To the best of our knowledge, this is the first report on properly utilizing the scattered POV in optical encryption system. To validate the generated key, one of the standard optical encryption systems i.e., Double Random Phase Encoding, is opted. Experimental and simulation results validate that the proposed key generation method is an effective alternative to the digital keys.

READ FULL TEXT
research
04/30/2022

Scattering of perfect optical vortex beams: Physical Unclonable Function

Now-a-days, data security has become an important part for anyone connec...
research
01/26/2022

Speckle-based optical cryptosystem and its application for human face recognition via deep learning

Face recognition has recently become ubiquitous in many scenes for authe...
research
12/23/2022

Clones of the Unclonable: Nanoduplicating Optical PUFs and Applications

Physical unclonable functions (PUFs), physical objects that are practica...
research
10/26/2016

Volumetric Light-field Encryption at the Microscopic Scale

We report a light-field based method that allows the optical encryption ...
research
06/28/2018

Securing the Storage Data Path with SGX Enclaves

We explore the use of SGX enclaves as a means to improve the security of...
research
03/06/2022

Image Encryption using Fractional Integral transforms: Vulnerabilities, Threats and Future scope

This paper presents a review on various image encryption schemes based o...
research
12/10/2019

Analyzing the Kasiski Method Against Vigenere Cipher

The weakness of the vigenere cipher lies in its short key and is repeate...

Please sign up or login with your details

Forgot password? Click here to reset