A Novel Security Key Generation Method for SRAM PUF Based on Fourier Analysis

被引:7
|
作者
Liu, Wenchao [1 ,2 ]
Lu, Zhaojun [1 ]
Liu, Hailong [1 ]
Min, Run [1 ]
Zeng, Zhangfan [2 ]
Liu, Zhenglin [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Opt & Elect Informat, Wuhan 430074, Hubei, Peoples R China
[2] Hubei Univ, Sch Comp Sci & Informat Engn, Wuhan 430062, Hubei, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Fourier analysis; key generation; PUF; SRAM;
D O I
10.1109/ACCESS.2018.2868824
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of the current security key generation schemes for static random access memory physical unclonable function (SRAM PUF) are based on a fuzzy extractor. However, it is difficult to deploy the fuzzy extractor in resource-constrained systems since the implementation of error correcting codes is complicated and requires huge processing resources. To this end, we propose a novel security key generation method for SRAM PUF based on a Fourier analysis. The SRAM PUF Boolean function is introduced to describe the power-up behavior of an SRAM device, which is followed by its Fourier spectrums. By exploring spectrums of the SRAM device, it is observed that the sign-bits of Fourier coefficients at certain generalized frequency points are randomly distributed and noise resistant. As such, the generalized frequency points as well as the sign-bits are suggested for security key generation in conjunction with a sign-bit encoding algorithm. The proposed method is well compared with the conventional fuzzy extractor. It is highlighted that error correcting code will not be involved in the whole lifecycle. Consequently, the method is suitable for the resource-constrained system applications. The proposed method is performed through couple of real measurements on two different platforms. The experimental results show that 8-kB SRAM cells have sufficient entropy for 128-bit security key generation.
引用
收藏
页码:49576 / 49587
页数:12
相关论文
共 49 条
  • [41] An anti-collusion attack defense method for physical layer key generation scheme based on transmission delay
    Wang, Xiaowen
    Huang, Jie
    Qi, Chunyang
    Peng, Yang
    Zhang, Shuaishuai
    PEERJ COMPUTER SCIENCE, 2023, 9
  • [42] An anti-collusion attack defense method for physical layer key generation scheme based on transmission delay
    Wang X.
    Huang J.
    Qi C.
    Peng Y.
    Zhang S.
    PeerJ Computer Science, 2023, 9
  • [43] A New Attack Method Against ECG-Based Key Generation and Agreement Schemes in Body Area Networks
    Hodgkiss, Jack
    Djahel, Soufiene
    Zhang, Zonghua
    IEEE SENSORS JOURNAL, 2021, 21 (15) : 17300 - 17307
  • [44] An efficient SRAM yield analysis method based on scaled-sigma adaptive importance sampling with meta-model accelerated
    Pang, Liang
    Wang, Ziqi
    Shi, Rui
    Yao, Mengyun
    Shi, Xiao
    Yan, Hao
    Shi, Longxin
    INTEGRATION-THE VLSI JOURNAL, 2023, 89 : 155 - 167
  • [45] Key Generation Method Based on Generative Adversarial Network and Its Application in Low-light-level Image Encryption
    Li J.
    Liu Z.
    Man Z.
    Binggong Xuebao/Acta Armamentarii, 2022, 43 (02): : 337 - 344
  • [46] A novel secure privacy-preserving data sharing model with deep-based key generation on the blockchain network in the cloud
    Samuel, B.
    Kasturi, K.
    COMPUTER STANDARDS & INTERFACES, 2025, 92
  • [47] Maximum power point tracking of wave power system based on fourier analysis method and modified grey wolf optimizer
    Yang J.
    Xiong F.
    Wu D.
    Xie D.
    Yang J.
    Taiyangneng Xuebao/Acta Energiae Solaris Sinica, 2021, 42 (01): : 406 - 415
  • [48] Efficient FPGA-Based Architecture of the Overlap-Add Method for Short-Time Fourier Analysis/Synthesis
    Bahoura, Mohammed
    ELECTRONICS, 2019, 8 (12)
  • [49] Convergence study of DGFEM SN based 2D/1D coupling method for solving neutron transport k-eigenvalue problems with Fourier analysis
    Kong, Boran
    Zhu, Kaijie
    Zhang, Han
    Hao, Chen
    Guo, Jiong
    Li, Fu
    ANNALS OF NUCLEAR ENERGY, 2022, 177