Secure and Reliable Key Agreement with Physical Unclonable Functions

Different transforms used in binding a secret key to correlated physical-identifier outputs are compared. Decorrelation efficiency is the metric used to determine transforms that give highly-uncorrelated outputs. Scalar quantizers are applied to transform outputs to extract uniformly distributed bit...

Full description

Bibliographic Details
Main Authors: Onur Günlü, Tasnad Kernetzky, Onurcan İşcan, Vladimir Sidorenko, Gerhard Kramer, Rafael F. Schaefer
Format: Article
Language:English
Published: MDPI AG 2018-05-01
Series:Entropy
Subjects:
Online Access:http://www.mdpi.com/1099-4300/20/5/340
_version_ 1811187283376734208
author Onur Günlü
Tasnad Kernetzky
Onurcan İşcan
Vladimir Sidorenko
Gerhard Kramer
Rafael F. Schaefer
author_facet Onur Günlü
Tasnad Kernetzky
Onurcan İşcan
Vladimir Sidorenko
Gerhard Kramer
Rafael F. Schaefer
author_sort Onur Günlü
collection DOAJ
description Different transforms used in binding a secret key to correlated physical-identifier outputs are compared. Decorrelation efficiency is the metric used to determine transforms that give highly-uncorrelated outputs. Scalar quantizers are applied to transform outputs to extract uniformly distributed bit sequences to which secret keys are bound. A set of transforms that perform well in terms of the decorrelation efficiency is applied to ring oscillator (RO) outputs to improve the uniqueness and reliability of extracted bit sequences, to reduce the hardware area and information leakage about the key and RO outputs, and to maximize the secret-key length. Low-complexity error-correction codes are proposed to illustrate two complete key-binding systems with perfect secrecy, and better secret-key and privacy-leakage rates than existing methods. A reference hardware implementation is also provided to demonstrate that the transform-coding approach occupies a small hardware area.
first_indexed 2024-04-11T13:59:40Z
format Article
id doaj.art-c3c20474457c4e02bf7f8258ab383ae9
institution Directory Open Access Journal
issn 1099-4300
language English
last_indexed 2024-04-11T13:59:40Z
publishDate 2018-05-01
publisher MDPI AG
record_format Article
series Entropy
spelling doaj.art-c3c20474457c4e02bf7f8258ab383ae92022-12-22T04:20:09ZengMDPI AGEntropy1099-43002018-05-0120534010.3390/e20050340e20050340Secure and Reliable Key Agreement with Physical Unclonable FunctionsOnur Günlü0Tasnad Kernetzky1Onurcan İşcan2Vladimir Sidorenko3Gerhard Kramer4Rafael F. Schaefer5Chair of Communications Engineering, Technical University of Munich, 80333 Munich, GermanyAssociate Professorship of Line Transmission Technology, Technical University of Munich, 80333 Munich, GermanyHuawei Technologies Duesseldorf GmbH, 80992 Munich, GermanyChair of Communications Engineering, Technical University of Munich, 80333 Munich, GermanyChair of Communications Engineering, Technical University of Munich, 80333 Munich, GermanyInformation Theory and Applications Chair, Technische Universität Berlin, 10587 Berlin, GermanyDifferent transforms used in binding a secret key to correlated physical-identifier outputs are compared. Decorrelation efficiency is the metric used to determine transforms that give highly-uncorrelated outputs. Scalar quantizers are applied to transform outputs to extract uniformly distributed bit sequences to which secret keys are bound. A set of transforms that perform well in terms of the decorrelation efficiency is applied to ring oscillator (RO) outputs to improve the uniqueness and reliability of extracted bit sequences, to reduce the hardware area and information leakage about the key and RO outputs, and to maximize the secret-key length. Low-complexity error-correction codes are proposed to illustrate two complete key-binding systems with perfect secrecy, and better secret-key and privacy-leakage rates than existing methods. A reference hardware implementation is also provided to demonstrate that the transform-coding approach occupies a small hardware area.http://www.mdpi.com/1099-4300/20/5/340key agreementphysical unclonable functionstransform codingprivacy leakagehardware implementation
spellingShingle Onur Günlü
Tasnad Kernetzky
Onurcan İşcan
Vladimir Sidorenko
Gerhard Kramer
Rafael F. Schaefer
Secure and Reliable Key Agreement with Physical Unclonable Functions
Entropy
key agreement
physical unclonable functions
transform coding
privacy leakage
hardware implementation
title Secure and Reliable Key Agreement with Physical Unclonable Functions
title_full Secure and Reliable Key Agreement with Physical Unclonable Functions
title_fullStr Secure and Reliable Key Agreement with Physical Unclonable Functions
title_full_unstemmed Secure and Reliable Key Agreement with Physical Unclonable Functions
title_short Secure and Reliable Key Agreement with Physical Unclonable Functions
title_sort secure and reliable key agreement with physical unclonable functions
topic key agreement
physical unclonable functions
transform coding
privacy leakage
hardware implementation
url http://www.mdpi.com/1099-4300/20/5/340
work_keys_str_mv AT onurgunlu secureandreliablekeyagreementwithphysicalunclonablefunctions
AT tasnadkernetzky secureandreliablekeyagreementwithphysicalunclonablefunctions
AT onurcaniscan secureandreliablekeyagreementwithphysicalunclonablefunctions
AT vladimirsidorenko secureandreliablekeyagreementwithphysicalunclonablefunctions
AT gerhardkramer secureandreliablekeyagreementwithphysicalunclonablefunctions
AT rafaelfschaefer secureandreliablekeyagreementwithphysicalunclonablefunctions