The entropy of keys derived from laser speckle

10/26/2007
by   B. Skoric, et al.
0

Laser speckle has been proposed in a number of papers as a high-entropy source of unpredictable bits for use in security applications. Bit strings derived from speckle can be used for a variety of security purposes such as identification, authentication, anti-counterfeiting, secure key storage, random number generation and tamper protection. The choice of laser speckle as a source of random keys is quite natural, given the chaotic properties of speckle. However, this same chaotic behaviour also causes reproducibility problems. Cryptographic protocols require either zero noise or very low noise in their inputs; hence the issue of error rates is critical to applications of laser speckle in cryptography. Most of the literature uses an error reduction method based on Gabor filtering. Though the method is successful, it has not been thoroughly analysed. In this paper we present a statistical analysis of Gabor-filtered speckle patterns. We introduce a model in which perturbations are described as random phase changes in the source plane. Using this model we compute the second and fourth order statistics of Gabor coefficients. We determine the mutual information between perturbed and unperturbed Gabor coefficients and the bit error rate in the derived bit string. The mutual information provides an absolute upper bound on the number of secure bits that can be reproducibly extracted from noisy measurements.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/29/2021

Moonshine: An Online Randomness Distiller for Zero-Involvement Authentication

Context-based authentication is a method for transparently validating an...
research
09/08/2022

Security Analysis of the EDHOC protocol

Ephemeral Diffie-Hellman Over COSE (EDHOC) aims at being a very compact ...
research
02/12/2021

Distributed Source Coding with Encryption Using Correlated Keys

We pose and investigate the distributed secure source coding based on th...
research
07/11/2023

Let's shake on it: Extracting secure shared keys from Wi-Fi CSI

A shared secret key is necessary for encrypted communications. Since Wi-...
research
08/04/2018

Implementation and Analysis of Stable PUFs Using Gate Oxide Breakdown

We implement and analyze highly stable PUFs using two random gate oxide ...
research
10/01/2018

Stronger Cryptography For Every Device, Everywhere

Generating secure random numbers is a central problem in cryptography th...
research
12/24/2019

Smooth Operator – The Use of Smooth Integers in Fast Generation of RSA Keys

Primality generation is the cornerstone of several essential cryptograph...

Please sign up or login with your details

Forgot password? Click here to reset