An Error Correction Approach to Memristors PUF-based Key Encapsulation

被引:7
|
作者
Korenda, Ashwija Reddy [1 ]
Assiri, Sareh [1 ]
Afghah, Fatemeh [1 ]
Cambou, Bertrand [1 ]
机构
[1] Northern Arizona Univ Flagstaff, Sch Informat Comp & Cyber Syst, Flagstaff, AZ 86011 USA
关键词
Key encapsulation; Keyless Encryption; Physically Unclonable Functions; memristor PUFs; error correction;
D O I
10.1109/COINS51742.2021.9524282
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A novel Physically Unclonable Functions (PUF)-based keyless encapsulation protocol was recently proposed by our team that does not rely on cryptographic keys and directly encrypts the messages using the unique responses extracted from embedded ReRAM PUFs in the devices. Therefore, this method avoids challenges and security threats due to key storage and distribution. Since this protocol uses analog resistance values from ReRAM PUFs for message encryption, the protocol is sensitive to variations in PUF responses due to environmental conditions. Therefore, it requires schemes to minimize the impact of such variations to guarantee the integrity of the decryption of the message. In this paper, we develop protocols to utilize Error Correction Coding (ECC) mechanisms to stabilize the cipher text encrypted with this protocol. The ECC-based key encapsulation protocol was evaluated using Reed-Solomon and BCH codes. The results show the effectiveness of the proposed protocol in offering noisefree messages under common ranges of environmental variations in ReRAM PUF responses.
引用
收藏
页码:7 / 12
页数:6
相关论文
共 50 条
  • [31] Lightweight and secure PUF-based authenticated key agreement scheme for smart grid
    Mahdi Tahavori
    Farokhlagha Moazami
    Peer-to-Peer Networking and Applications, 2020, 13 : 1616 - 1628
  • [32] Entropy Loss in PUF-based Key Generation Schemes: The Repetition Code Pitfall
    Koeberl, Patrick
    Li, Jiangtao
    Rajan, Anand
    Wu, Wei
    2014 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), 2014, : 44 - 49
  • [33] PUF-Based Mutual-Authenticated Key Distribution for Dynamic Sensor Networks
    Liu, Yanan
    Cui, Yijun
    Harn, Lein
    Zhang, Zheng
    Yan, Hao
    Cheng, Yuan
    Qiu, Shuo
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021 (2021)
  • [34] PLAKE: PUF-Based Secure Lightweight Authentication and Key Exchange Protocol for IoT
    Roy, Sourav
    Das, Dipnarayan
    Mondal, Anindan
    Mahalat, Mahabub Hasan
    Sen, Bibhash
    Sikdar, Biplab
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (10) : 8547 - 8559
  • [35] Using the Reconfigurability of Modern FPGAs for Highly Efficient PUF-Based Key Generation
    Gehrer, Stefan
    Sigl, Georg
    2015 10TH INTERNATIONAL SYMPOSIUM ON RECONFIGURABLE COMMUNICATION-CENTRIC SYSTEMS-ON-CHIP (RECOSOC), 2015,
  • [36] Secure PUF-based Authentication and Key Exchange Protocol using Machine Learning
    Ali-Pour, Amir
    Afghah, Fatemeh
    Hely, David
    Beroulle, Vincent
    Di Natale, Giorgio
    2022 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2022), 2022, : 386 - 389
  • [37] A Secure and Robust PUF-based Key Generation with Wiretap Polar Coset Codes
    Bai, Yonghong
    Yan, Zhiyuan
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2021, 37 (03): : 305 - 316
  • [38] Security Analysis of Index-Based Syndrome Coding for PUF-Based Key Generation
    Becker, Georg T.
    Wild, Alexander
    Gueneysu, Tim
    2015 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2015, : 20 - 25
  • [39] Secure PUF-Based Authentication Systems
    Tun, Naing Win
    Mambo, Masahiro
    SENSORS, 2024, 24 (16)
  • [40] A PUF-Based Paradigm for IoT Security
    Idriss, Tarek
    Idriss, Haytham
    Bayoumi, Magdy
    2016 IEEE 3RD WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2016, : 700 - 705