An Error Correction Approach to Memristors PUF-based Key Encapsulation

被引:7
|
作者
Korenda, Ashwija Reddy [1 ]
Assiri, Sareh [1 ]
Afghah, Fatemeh [1 ]
Cambou, Bertrand [1 ]
机构
[1] Northern Arizona Univ Flagstaff, Sch Informat Comp & Cyber Syst, Flagstaff, AZ 86011 USA
关键词
Key encapsulation; Keyless Encryption; Physically Unclonable Functions; memristor PUFs; error correction;
D O I
10.1109/COINS51742.2021.9524282
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A novel Physically Unclonable Functions (PUF)-based keyless encapsulation protocol was recently proposed by our team that does not rely on cryptographic keys and directly encrypts the messages using the unique responses extracted from embedded ReRAM PUFs in the devices. Therefore, this method avoids challenges and security threats due to key storage and distribution. Since this protocol uses analog resistance values from ReRAM PUFs for message encryption, the protocol is sensitive to variations in PUF responses due to environmental conditions. Therefore, it requires schemes to minimize the impact of such variations to guarantee the integrity of the decryption of the message. In this paper, we develop protocols to utilize Error Correction Coding (ECC) mechanisms to stabilize the cipher text encrypted with this protocol. The ECC-based key encapsulation protocol was evaluated using Reed-Solomon and BCH codes. The results show the effectiveness of the proposed protocol in offering noisefree messages under common ranges of environmental variations in ReRAM PUF responses.
引用
收藏
页码:7 / 12
页数:6
相关论文
共 50 条
  • [1] EM Side-Channel Analysis of BCH-based Error Correction for PUF-based Key Generation
    Tebelmann, Lars
    Pehl, Michael
    Sigl, Georg
    PROCEEDINGS OF THE 2017 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY (ASHES'17), 2017, : 43 - 52
  • [2] PUF-based key distribution in wireless sensor networks
    Zhang Z.
    Liu Y.
    Zuo Q.
    Harn L.
    Qiu S.
    Cheng Y.
    Computers, Materials and Continua, 2020, 64 (02): : 1261 - 1280
  • [3] A novel PUF-Based key management scheme for DTMSN
    Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    不详
    J. Convergence Inf. Technol., 2012, 12 (372-381):
  • [4] Testing PUF-Based Secure Key Storage Circuits
    Cortez, Mafalda
    Roelofs, Gijs
    Hamdioui, Said
    di Natale, Giorgio
    2014 DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION (DATE), 2014,
  • [5] PUF-Based Key Distribution in Wireless Sensor Networks
    Zhang, Zheng
    Liu, Yanan
    Zuo, Qinyuan
    Harn, Lein
    Qiu, Shuo
    Cheng, Yuan
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 64 (02): : 1261 - 1280
  • [6] A New Secure Scan Design with PUF-based Key for Authentication
    Wang, Qidong
    Cui, Aijiao
    Qu, Gang
    Li, Huawei
    2020 IEEE 38TH VLSI TEST SYMPOSIUM (VTS 2020), 2020,
  • [7] A PUF-Based Key Storage Scheme Using Fuzzy Vault
    Yang, Jinrong
    Chen, Shuai
    Cao, Yuan
    SENSORS, 2023, 23 (07)
  • [8] PUF-Based Authentication
    Che, Wenjie
    Saqib, Fareena
    Plusquellic, Jim
    2015 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2015, : 337 - 344
  • [9] PUF-Based Fuzzy Authentication Without Error Correcting Codes
    Yan, Wei
    Tehranipoor, Fatemeh
    Chandy, John A.
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2017, 36 (09) : 1445 - 1457
  • [10] A Secure MQTT Framework from PUF-based Key Establishment
    Shin, SeongHan
    Kobara, Kazukuni
    PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2017, : 1296 - 1301