Secure and Reliable Key Agreement with Physical Unclonable Functions
Different transforms used in binding a secret key to correlated physical-identifier outputs are compared. Decorrelation efficiency is the metric used to determine transforms that give highly-uncorrelated outputs. Scalar quantizers are applied to transform outputs to extract uniformly distributed bit...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2018-05-01
|
Series: | Entropy |
Subjects: | |
Online Access: | http://www.mdpi.com/1099-4300/20/5/340 |
_version_ | 1811187283376734208 |
---|---|
author | Onur Günlü Tasnad Kernetzky Onurcan İşcan Vladimir Sidorenko Gerhard Kramer Rafael F. Schaefer |
author_facet | Onur Günlü Tasnad Kernetzky Onurcan İşcan Vladimir Sidorenko Gerhard Kramer Rafael F. Schaefer |
author_sort | Onur Günlü |
collection | DOAJ |
description | Different transforms used in binding a secret key to correlated physical-identifier outputs are compared. Decorrelation efficiency is the metric used to determine transforms that give highly-uncorrelated outputs. Scalar quantizers are applied to transform outputs to extract uniformly distributed bit sequences to which secret keys are bound. A set of transforms that perform well in terms of the decorrelation efficiency is applied to ring oscillator (RO) outputs to improve the uniqueness and reliability of extracted bit sequences, to reduce the hardware area and information leakage about the key and RO outputs, and to maximize the secret-key length. Low-complexity error-correction codes are proposed to illustrate two complete key-binding systems with perfect secrecy, and better secret-key and privacy-leakage rates than existing methods. A reference hardware implementation is also provided to demonstrate that the transform-coding approach occupies a small hardware area. |
first_indexed | 2024-04-11T13:59:40Z |
format | Article |
id | doaj.art-c3c20474457c4e02bf7f8258ab383ae9 |
institution | Directory Open Access Journal |
issn | 1099-4300 |
language | English |
last_indexed | 2024-04-11T13:59:40Z |
publishDate | 2018-05-01 |
publisher | MDPI AG |
record_format | Article |
series | Entropy |
spelling | doaj.art-c3c20474457c4e02bf7f8258ab383ae92022-12-22T04:20:09ZengMDPI AGEntropy1099-43002018-05-0120534010.3390/e20050340e20050340Secure and Reliable Key Agreement with Physical Unclonable FunctionsOnur Günlü0Tasnad Kernetzky1Onurcan İşcan2Vladimir Sidorenko3Gerhard Kramer4Rafael F. Schaefer5Chair of Communications Engineering, Technical University of Munich, 80333 Munich, GermanyAssociate Professorship of Line Transmission Technology, Technical University of Munich, 80333 Munich, GermanyHuawei Technologies Duesseldorf GmbH, 80992 Munich, GermanyChair of Communications Engineering, Technical University of Munich, 80333 Munich, GermanyChair of Communications Engineering, Technical University of Munich, 80333 Munich, GermanyInformation Theory and Applications Chair, Technische Universität Berlin, 10587 Berlin, GermanyDifferent transforms used in binding a secret key to correlated physical-identifier outputs are compared. Decorrelation efficiency is the metric used to determine transforms that give highly-uncorrelated outputs. Scalar quantizers are applied to transform outputs to extract uniformly distributed bit sequences to which secret keys are bound. A set of transforms that perform well in terms of the decorrelation efficiency is applied to ring oscillator (RO) outputs to improve the uniqueness and reliability of extracted bit sequences, to reduce the hardware area and information leakage about the key and RO outputs, and to maximize the secret-key length. Low-complexity error-correction codes are proposed to illustrate two complete key-binding systems with perfect secrecy, and better secret-key and privacy-leakage rates than existing methods. A reference hardware implementation is also provided to demonstrate that the transform-coding approach occupies a small hardware area.http://www.mdpi.com/1099-4300/20/5/340key agreementphysical unclonable functionstransform codingprivacy leakagehardware implementation |
spellingShingle | Onur Günlü Tasnad Kernetzky Onurcan İşcan Vladimir Sidorenko Gerhard Kramer Rafael F. Schaefer Secure and Reliable Key Agreement with Physical Unclonable Functions Entropy key agreement physical unclonable functions transform coding privacy leakage hardware implementation |
title | Secure and Reliable Key Agreement with Physical Unclonable Functions |
title_full | Secure and Reliable Key Agreement with Physical Unclonable Functions |
title_fullStr | Secure and Reliable Key Agreement with Physical Unclonable Functions |
title_full_unstemmed | Secure and Reliable Key Agreement with Physical Unclonable Functions |
title_short | Secure and Reliable Key Agreement with Physical Unclonable Functions |
title_sort | secure and reliable key agreement with physical unclonable functions |
topic | key agreement physical unclonable functions transform coding privacy leakage hardware implementation |
url | http://www.mdpi.com/1099-4300/20/5/340 |
work_keys_str_mv | AT onurgunlu secureandreliablekeyagreementwithphysicalunclonablefunctions AT tasnadkernetzky secureandreliablekeyagreementwithphysicalunclonablefunctions AT onurcaniscan secureandreliablekeyagreementwithphysicalunclonablefunctions AT vladimirsidorenko secureandreliablekeyagreementwithphysicalunclonablefunctions AT gerhardkramer secureandreliablekeyagreementwithphysicalunclonablefunctions AT rafaelfschaefer secureandreliablekeyagreementwithphysicalunclonablefunctions |