GLOBECOM 2017 - 2017 IEEE Global Communications Conference 2017
DOI: 10.1109/glocom.2017.8254007
|View full text |Cite
|
Sign up to set email alerts
|

A Robust SRAM-PUF Key Generation Scheme Based on Polar Codes

Abstract: Physical unclonable functions (PUFs) are relatively new security primitives used for device authentication and device-specific secret key generation. In this paper we focus on SRAM-PUFs. The SRAM-PUFs enjoy uniqueness and randomness properties stemming from the intrinsic randomness of SRAM memory cells, which is a result of manufacturing variations. This randomness can be translated into the cryptographic keys thus avoiding the need to store and manage the device cryptographic keys. Therefore these properties,… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
32
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 45 publications
(32 citation statements)
references
References 25 publications
0
32
0
Order By: Relevance
“…To satisfy the block-error probability requirement for each PUF realization, one could consider using the maximum distortion instead of 0 [6], n = 1408 Prev. Polar Code [44], n = 1024 Code 1, n = 1024 Code 2, n = 2048 Figure 10. Storage-key rates for the GS model with p A = 0.15.…”
Section: Designed Polar Codes For the Gs Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…To satisfy the block-error probability requirement for each PUF realization, one could consider using the maximum distortion instead of 0 [6], n = 1408 Prev. Polar Code [44], n = 1024 Code 1, n = 1024 Code 2, n = 2048 Figure 10. Storage-key rates for the GS model with p A = 0.15.…”
Section: Designed Polar Codes For the Gs Modelmentioning
confidence: 99%
“…achievable, n = 1024 FCS/COFE achievable, n = 2048 Best Code in[6], n = 1408 Prev. Polar Code[49], n = 1024 Code 1, n = 1024 Code 2, n = 2048 Storage-key rates for the GS model with p A = 0.15. The (R *…”
mentioning
confidence: 99%
“…A single-bit mismatch in a cryptographic key is not acceptable for most encryption protocols. Therefore, the use of error correcting methods [44], helper data [45][46][47], and fuzzy extractors [48,49] is needed to achieve the zero error level required. Error correcting schemes burden client devices, as they consume additional computing power to run fuzzy extraction and error correcting codes.…”
Section: Ternary Physical Unclonable Functionsmentioning
confidence: 99%
“…We consider three best code constructions proposed for the GS and CS models, which are COFE and the polar code construction in [ 47 ] for the GS model, and FCS for the CS model, in order to compare them with the WZ-coding constructions. The FCS and COFE achieve only a single point on the key-leakage rate region boundary, i.e., and .…”
Section: Code Constructions For Pufsmentioning
confidence: 99%
“…The storage rate of 1 bit/source-bit is decreased by using the polar code construction proposed in [ 47 ]. Nevertheless, this construction cannot achieve the key-leakage-storage region.…”
Section: Code Constructions For Pufsmentioning
confidence: 99%