Secure and Reliable Key Agreement with Physical Unclonable Functions

02/26/2020
by   Onur Günlü, et al.
1

Different transforms used in binding a secret key to correlated physical-identifier outputs are compared. Decorrelation efficiency is the metric used to determine transforms that give highly-uncorrelated outputs. Scalar quantizers are applied to transform outputs to extract uniformly distributed bit sequences to which secret keys are bound. A set of transforms that perform well in terms of the decorrelation efficiency is applied to ring oscillator (RO) outputs to improve the uniqueness and reliability of extracted bit sequences, to reduce the hardware area and information leakage about the key and RO outputs, and to maximize the secret-key length. Low-complexity error-correction codes are proposed to illustrate two complete key-binding systems with perfect secrecy, and better secret-key and privacy-leakage rates than existing methods. A reference hardware implementation is also provided to demonstrate that the transform-coding approach occupies a small hardware area.

READ FULL TEXT

page 3

page 6

page 8

page 15

page 16

page 17

page 18

page 19

research
07/12/2021

Quality of Service Guarantees for Physical Unclonable Functions

We consider a secret key agreement problem in which noisy physical unclo...
research
04/04/2020

Low-complexity and Reliable Transforms for Physical Unclonable Functions

Noisy measurements of a physical unclonable function (PUF) are used to s...
research
10/16/2018

Probing Attacks on Physical Layer Key Agreement for Automotive Controller Area Networks (Extended Version)

Efficient key management for automotive networks (CAN) is a critical ele...
research
02/20/2021

A Novel Key Generation Scheme Using Quaternary PUF Responses and Wiretap Polar Coding

Physical unclonable functions (PUFs) are widely considered in secret key...
research
12/16/2020

Secret Key Agreement with Physical Unclonable Functions: An Optimality Summary

We address security and privacy problems for digital devices and biometr...
research
02/21/2022

Secret Key-based Authentication With Passive Eavesdropper for Scalar Gaussian Sources

We analyze the fundamental trade-off of secret key-based authentication ...
research
09/06/2018

One-Shot Variable-Length Secret Key Agreement Approaching Mutual Information

This paper studies an information-theoretic one-shot variable-length sec...

Please sign up or login with your details

Forgot password? Click here to reset