Secure and reliable key agreement with physical unclonable functions

Research output: Contribution to journalResearch articleContributedpeer-review

Contributors

  • Onur Günlü - , Technical University of Munich (Author)
  • Tasnad Kernetzky - , Technical University of Munich (Author)
  • Onurcan Işcan - , Huawei Technologies Co., Ltd. (Author)
  • Vladimir Sidorenko - , Technical University of Munich (Author)
  • Gerhard Kramer - , Technical University of Munich (Author)
  • Rafael F. Schaefer - , Technical University of Berlin (Author)

Abstract

Different transforms used in binding a secret key to correlated physical-identifier outputs are compared. Decorrelation efficiency is the metric used to determine transforms that give highly-uncorrelated outputs. Scalar quantizers are applied to transform outputs to extract uniformly distributed bit sequences to which secret keys are bound. A set of transforms that perform well in terms of the decorrelation efficiency is applied to ring oscillator (RO) outputs to improve the uniqueness and reliability of extracted bit sequences, to reduce the hardware area and information leakage about the key and RO outputs, and to maximize the secret-key length. Low-complexity error-correction codes are proposed to illustrate two complete key-binding systems with perfect secrecy, and better secret-key and privacy-leakage rates than existing methods. A reference hardware implementation is also provided to demonstrate that the transform-coding approach occupies a small hardware area.

Details

Original languageEnglish
Article number340
JournalEntropy
Volume20
Issue number5
Publication statusPublished - 3 May 2018
Peer-reviewedYes
Externally publishedYes

External IDs

ORCID /0000-0002-1702-9075/work/165878285

Keywords

Keywords

  • Hardware implementation, Key agreement, Physical unclonable functions, Privacy leakage, Transform coding