A Novel Security Key Generation Method for SRAM PUF Based on Fourier Analysis

被引:7
|
作者
Liu, Wenchao [1 ,2 ]
Lu, Zhaojun [1 ]
Liu, Hailong [1 ]
Min, Run [1 ]
Zeng, Zhangfan [2 ]
Liu, Zhenglin [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Opt & Elect Informat, Wuhan 430074, Hubei, Peoples R China
[2] Hubei Univ, Sch Comp Sci & Informat Engn, Wuhan 430062, Hubei, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Fourier analysis; key generation; PUF; SRAM;
D O I
10.1109/ACCESS.2018.2868824
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of the current security key generation schemes for static random access memory physical unclonable function (SRAM PUF) are based on a fuzzy extractor. However, it is difficult to deploy the fuzzy extractor in resource-constrained systems since the implementation of error correcting codes is complicated and requires huge processing resources. To this end, we propose a novel security key generation method for SRAM PUF based on a Fourier analysis. The SRAM PUF Boolean function is introduced to describe the power-up behavior of an SRAM device, which is followed by its Fourier spectrums. By exploring spectrums of the SRAM device, it is observed that the sign-bits of Fourier coefficients at certain generalized frequency points are randomly distributed and noise resistant. As such, the generalized frequency points as well as the sign-bits are suggested for security key generation in conjunction with a sign-bit encoding algorithm. The proposed method is well compared with the conventional fuzzy extractor. It is highlighted that error correcting code will not be involved in the whole lifecycle. Consequently, the method is suitable for the resource-constrained system applications. The proposed method is performed through couple of real measurements on two different platforms. The experimental results show that 8-kB SRAM cells have sufficient entropy for 128-bit security key generation.
引用
收藏
页码:49576 / 49587
页数:12
相关论文
共 49 条
  • [11] A Trustworthy Key Generation Prototype Based on DDR3 PUF for Wireless Sensor Networks
    Liu, Wenchao
    Zhang, Zhenhua
    Li, Miaoxin
    Liu, Zhenglin
    SENSORS, 2014, 14 (07) : 11542 - 11556
  • [12] A Method to Utilize Mismatch Size to Produce an Additional Stable Bit in a Tilting SRAM-Based PUF
    Shifman, Yizhak
    Miller, Avi
    Keren, Osnat
    Weizman, Yoav
    Shor, Joseph
    IEEE ACCESS, 2020, 8 : 219137 - 219150
  • [13] A novel key generation method for wireless sensor networks based on system of equations
    Zhan, Furui
    Yao, Nianmin
    Gao, Zhenguo
    Tan, Guozhen
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 82 : 114 - 127
  • [14] Cyber Security Protocol for Secure Traffic Monitoring Systems using PUF-based Key Management
    Pudi, Vikramkumar
    Bodapati, Srinivasu
    Kumar, Sachin
    Chattopadhyay, Anupam
    2020 6TH IEEE INTERNATIONAL SYMPOSIUM ON SMART ELECTRONIC SYSTEMS (ISES 2020) (FORMERLY INIS), 2020, : 103 - 108
  • [15] A Trustworthy key Generation Prototype based on DDR3 PUF for Wireless Sensor Networks
    Liu, Wenchao
    Zhang, Zhenhua
    Li, Miaoxin
    Liu, Zhenglin
    2014 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C 2014), 2014, : 706 - 709
  • [16] Survey of Biometric Based Key Generation to Enhance Security of Cryptosystems
    Sadkhan, Sattar B.
    AL-Shukur, Baheeja K.
    Mattar, Ali K.
    2016 AL-SADIQ INTERNATIONAL CONFERENCE ON MULTIDISCIPLINARY IN IT AND COMMUNICATION TECHNIQUES SCIENCE AND APPLICATIONS (AIC-MITCSA), 2016,
  • [17] An XDL Analysis Method for SRAM-Based FPGA
    Liu, Junfeng
    Yan, Yunyi
    Wu, Jinfu
    INTELLIGENT DATA ANALYSIS AND APPLICATIONS, (ECC 2016), 2017, 535 : 241 - 248
  • [18] A Method of Automatic Key Generation Based on Handwriting
    Yin, Chunyong
    Sun, Ruxia
    Bi, Shuoben
    SNPD 2009: 10TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCES, NETWORKING AND PARALLEL DISTRIBUTED COMPUTING, PROCEEDINGS, 2009, : 213 - 214
  • [19] A Novel Method Evaluating Vascular Resistance Based on Fourier Analysis for Pulse Waveform
    Yang, Huifeng
    Zhou, Qi
    Xiao, Jun
    2009 3RD INTERNATIONAL CONFERENCE ON BIOINFORMATICS AND BIOMEDICAL ENGINEERING, VOLS 1-11, 2009, : 1227 - 1229
  • [20] Biometric based Key-Generation System for Multimedia Data Security
    Verma, Indu
    Jain, Sanjay
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 864 - 869