scholarly journals Revisiting silk: a lens-free optical physical unclonable function

2022 ◽  
Vol 13 (1) ◽  
Author(s):  
Min Seok Kim ◽  
Gil Ju Lee ◽  
Jung Woo Leem ◽  
Seungho Choi ◽  
Young L. Kim ◽  
...  

AbstractFor modern security, devices, individuals, and communications require unprecedentedly unique identifiers and cryptographic keys. One emerging method for guaranteeing digital security is to take advantage of a physical unclonable function. Surprisingly, native silk, which has been commonly utilized in everyday life as textiles, can be applied as a unique tag material, thereby removing the necessary apparatus for optical physical unclonable functions, such as an objective lens or a coherent light source. Randomly distributed fibers in silk generate spatially chaotic diffractions, forming self-focused spots on the millimeter scale. The silk-based physical unclonable function has a self-focusing, low-cost, and eco-friendly feature without relying on pre-/post-process for security tag creation. Using these properties, we implement a lens-free, optical, and portable physical unclonable function with silk identification cards and study its characteristics and reliability in a systemic manner. We further demonstrate the feasibility of the physical unclonable functions in two modes: authentication and data encryption.

Author(s):  
Karim Lounis ◽  
Mohammad Zulkernine

The service of authentication constitutes the spine of all security properties. It is the phase where entities prove their identities to each other and generally establish and derive cryptographic keys to provide confidentiality, data integrity, non-repudiation, and availability. Due to the heterogeneity and the particular security requirements of IoT (Internet of Things), developing secure, low-cost, and lightweight authentication protocols has become a serious challenge. This has excited the research community to design and develop new authentication protocols that meet IoT requirements. A recent technology, called PUFs (Physical Unclonable Functions), has been the subject of many subsequent publications on lightweight, low-cost, and secure-by-design authentication protocols. This has turned our attention to investigate the most recent PUF-based authentication protocols for IoT. In this paper, we review the security of these protocols. We first provide the necessary background on PUFs, their types, and related attacks. Also, we discuss how PUFs are used for authentication. Then, we analyze the security of PUF-based authentication protocols to identify and report common security issues and design flaws, as well as to provide recommendations for future authentication protocol designers.


2011 ◽  
Vol 6 (1) ◽  
pp. 25-34
Author(s):  
Rafael I. Soares ◽  
Ney L. V. Calazans ◽  
Victor Lomné ◽  
Amine Dehbaoui ◽  
Philippe Maurine ◽  
...  

Side channels attacks (SCAs) are very effective and low cost methods to extract secret information from supposedly secure cryptosystems.The traditional synchronous design flow used to create such systems favors the leakage of information, which enables attackers to draw correlations between data processes and circuit power consumption, electromagnetic radiation or other sources of leakage. By using well known analysis techniques, these correlations may allow that an attacker retrieves secret cryptographic keys. Differential Power Analysis (DPA) and Differential Electromagnetic Analysis (DEMA) are among the most cited attack types. More accurate types of attacks have been proposed, including Correlation Power Analysis (CPA) that associates power quantities with a specific power model. In recent years, several countermeasures against SCAs have been proposed. Fully asynchronous and globally asynchronous locally synchronous (GALS) design methods appear as alternatives to design tamper resistant cryptosystems. However, according to previous works they use to achieve this with significant area, throughput, latency and power penalties and are not absolutely secure. This paper proposes a new GALS pipeline architecture for the Data Encryption Standard (DES) that explores the trade-off between circuit area and robustness to SCAs. Robustness is enhanced by replicating the DES hardware structure in asynchronously communicating module instances, coupled with self-varying operating frequencies. Designs prototyped on FPGAs with the proposed technique presented promising robustness against attacks, after submitted to differential and correlation analyses. This is true for both power and electromagnetic channels. Additionally the proposed architecture displays throughput superior to previously reported results.


Author(s):  
F. Zhou ◽  
C. Adolphsen ◽  
A. Benwell ◽  
G. Brown ◽  
D. H. Dowell ◽  
...  

Author(s):  
E. Hemsing ◽  
G. Marcus ◽  
W. M. Fawley ◽  
R. W. Schoenlein ◽  
R. Coffee ◽  
...  

2017 ◽  
Author(s):  
Diling Zhu ◽  
Yanwen Sun ◽  
Donald W. Schafer ◽  
Hongliang Shi ◽  
Justin H. James ◽  
...  

Author(s):  
Norihito Saito ◽  
Kazuyuki Akagawa ◽  
Yutaka Hayano ◽  
Hideki Takami ◽  
Yoshihiko Saito ◽  
...  

1994 ◽  
Vol 7 (5) ◽  
pp. 22-27 ◽  
Author(s):  
J. Arthur ◽  
G. Materlik ◽  
R. Tatchyn ◽  
H. Winick

Sign in / Sign up

Export Citation Format

Share Document