Twin physically unclonable functions based on aligned carbon nanotube arrays

被引:0
作者
Donglai Zhong
Jingxia Liu
Mengmeng Xiao
Yunong Xie
Huiwen Shi
Lijun Liu
Chenyi Zhao
Li Ding
Lian-Mao Peng
Zhiyong Zhang
机构
[1] Peking University,Key Laboratory for the Physics and Chemistry of Nanodevices and Center for Carbon
[2] Jihua Laboratory,based Electronics, Department of Electronics
[3] Peking University,Frontiers Science Center for Nano
来源
Nature Electronics | 2022年 / 5卷
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Physically unclonable functions (PUFs) are a promising technology for generating cryptographic primitives using random imperfections in a physical entity. However, the keys inside PUFs are still vulnerable as they must be written into non-volatile memories and shared with participants that do not hold the PUF before secure communication. Here we show that pairs of identical PUFs (twin PUFs) can be fabricated together on an aligned carbon nanotube array and used for secure communication without key pre-extraction and storage. Two rows of field-effect transistors are fabricated perpendicular to the carbon nanotube growth direction, randomly producing three types of transistor channel—based on metallic nanotubes, semiconducting nanotubes and no nanotubes—that can be used to extract ternary bits for use as a shared key. The twin PUFs exhibit high uniformity, uniqueness, randomness and reliability, as well as a consistency of approximately 95%. We show that separated twin PUFs can provide secure communication with a bit error rate of one bit per trillion via a fault-tolerant design.
引用
收藏
页码:424 / 432
页数:8
相关论文
共 79 条
  • [1] Rivest R(1978)A method for obtaining digital signatures and public-key cryptosystems Commun. ACM 21 120-126
  • [2] Shamir A(1997)Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer SIAM J. Comput. 26 1484-1509
  • [3] Adleman L(1999)Design principles for tamper-resistant smartcard processors Smartcard 99 9-20
  • [4] Shor PW(2000)Simple proof of security of the BB84 quantum key distribution protocol Phys. Rev. Lett. 85 441-444
  • [5] Kömmerling O(2009)The security of practical quantum key distribution Rev. Mod. Phys. 81 1301-1350
  • [6] Kuhn MG(2002)Single photon quantum cryptography Phys. Rev. Lett. 89 187901-1551
  • [7] Shor PW(2003)Long-distance quantum communication with entangled photons using satellites IEEE J. Sel. Topics Quantum Electron. 9 1541-2030
  • [8] Preskill J(2002)Physical one-way functions Science 297 2026-1141
  • [9] Scarani V(2014)Physical unclonable functions and applications: a tutorial Proc. IEEE 102 1126-3433
  • [10] Beveratos A(2017)Security beyond CMOS: fundamentals, applications, and roadmap IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 25 3420-2663