2022
DOI: 10.1002/adpr.202200225
|View full text |Cite
|
Sign up to set email alerts
|

Quantifying the Sensitivity and Unclonability of Optical Physical Unclonable Functions

Abstract: According to recent estimates, [1] the looming internet of things and worldwide information exchange by the year 2018-2023 will produce a global data stream of around tens zettabytes per annum. This requires secure and reliable authentication methods in order to protect private information and to safeguard access to personal devices and services. The currently widespread techniques to this end rely on the permanent storage of digital secret keys in electronic devices, for example, in smartphones, car keys, ban… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 48 publications
0
4
0
Order By: Relevance
“…Herein, it is important to highlight that to generate different challenges a Mersenne “twister” algorithm has been used. For each challenge response pair, an authority database is generated by enrolling the collected CRPs that will be used in the future for speckle comparison during the authentication process ,, (more details in Experimental Section). Once the CRPs are collected and stored, the authentication process that is used is based on the following steps.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Herein, it is important to highlight that to generate different challenges a Mersenne “twister” algorithm has been used. For each challenge response pair, an authority database is generated by enrolling the collected CRPs that will be used in the future for speckle comparison during the authentication process ,, (more details in Experimental Section). Once the CRPs are collected and stored, the authentication process that is used is based on the following steps.…”
Section: Resultsmentioning
confidence: 99%
“…Here, we used a 270 pixel × 360 pixel camera with 40 FPS for this task. All of the details of the experimental setup are reported in refs and . The readout requires <5 min.…”
Section: Methodsmentioning
confidence: 99%
“…Because PUFs that use light-encoded data as challenge and response are less susceptible to side-channel threats that collect CRPs, previous work has studied several optical/photonic PUF architectures. 37,39,[44][45][46][47][48][49][50][51][52][53] Designs include optical scattering PUFs, which use the movement of scattered light around nano-sized obstacles to obtain responses, [44][45][46][47] and "silicon" photonic PUFs that use the interaction of light in a "chaotic silicon microcavity" to do the same. [49][50][51] Other designs control light's traversal through PIC components, 37,44 and Ref.…”
Section: Photonic Physically Unclonable Functionsmentioning
confidence: 99%
“…[ 2,19–22 ] In general, physical unclonable functions are defined as individual physical signatures whose intrinsic unpredictability produces a unique and “unclonable” response when interrogated by a specific challenge, following the so‐called challenge‐response pair (CRP) scheme. [ 23–26 ] Depending on the number of responses associated to a physical unclonable function, its strength can be classified as “weak” or “strong.” [ 27 ] Once interrogated, weak PUFs produce at least one response as in case of anti‐counterfeiting tags. [ 5,6 ] Strong PUFs instead are more complex systems that under interrogation produce a large number of independent responses from the same device.…”
Section: Introductionmentioning
confidence: 99%