| Literature DB >> 33265430 |
Onur Günlü1, Tasnad Kernetzky2, Onurcan İşcan3, Vladimir Sidorenko1, Gerhard Kramer1, Rafael F Schaefer4.
Abstract
Different transforms used in binding a secret key to correlated physical-identifier outputs are compared. Decorrelation efficiency is the metric used to determine transforms that give highly-uncorrelated outputs. Scalar quantizers are applied to transform outputs to extract uniformly distributed bit sequences to which secret keys are bound. A set of transforms that perform well in terms of the decorrelation efficiency is applied to ring oscillator (RO) outputs to improve the uniqueness and reliability of extracted bit sequences, to reduce the hardware area and information leakage about the key and RO outputs, and to maximize the secret-key length. Low-complexity error-correction codes are proposed to illustrate two complete key-binding systems with perfect secrecy, and better secret-key and privacy-leakage rates than existing methods. A reference hardware implementation is also provided to demonstrate that the transform-coding approach occupies a small hardware area.Entities:
Keywords: hardware implementation; key agreement; physical unclonable functions; privacy leakage; transform coding
Year: 2018 PMID: 33265430 PMCID: PMC7512859 DOI: 10.3390/e20050340
Source DB: PubMed Journal: Entropy (Basel) ISSN: 1099-4300 Impact factor: 2.524
Figure 1The fuzzy commitment scheme.
Figure 2Transform-coding steps.
The average RO output decorrelation-efficiency results.
| DCT | DWHT | DHT | |
|---|---|---|---|
| 0.9978 | 0.9977 | 0.9978 | |
| 0.9987 | 0.9988 | 0.9986 |
Figure 3The maximum key lengths for RO arrays.
Figure 4Hardware design overview.
Figure 5Building blocks for the DWHT implementation.
Hardware area and processing delays for RO PUF designs.
| Blocks | LUTs | Registers | MUXes | RAM & ROM (Byte) | Slices | Duration ( |
|---|---|---|---|---|---|---|
| Proposed-ROs | 1632 | 397 | 65 | 0 | 729 | 1600 |
| Proposed-DWHT | 326 | 200 | 0 | 1664 | 99 | 66 |
| Proposed-Quantizer | 43 | 39 | 0 | 638 | 21 | 14 |
| Proposed Total (ROPUF) | 2001 | 636 | 65 | 2302 | 849 | 1680 |
| PUFKY Total (ROPUF) [ | n.a. | n.a. | n.a. | n.a. | 952 | 4611 |
Figure 6The correctness probabilities for transform coefficients.
Code-parameter constraints.
|
| 16 | 17 | 18 | 19 | 20 |
|---|---|---|---|---|---|
|
|
|
|
|
|
|
|
| 3 | 3 | 3 | 3 | 3 |
|
| 144 | 224 | 250 | 255 | 259 |
|
| 18 | 20 | 21 | 23 | 25 |
Figure 7The operation point of the proposed BCH code , regions of achievable rate pairs according to (5) and (6), the maximum secret-key rate point, and a finite-length bound for bits, , and BSC .