Key Reconciliation Protocols for Error Correction of Silicon PUF Responses - 2017


Physical unclonable functions (PUFs) are promising primitives for the light-weight authentication of an integrated circuit (IC). Indeed, by extracting an identifier from random method variations, they allow each instance of a design to be uniquely identified. However, the extracted identifiers don't seem to be stable enough for use as is, and hence, need to be corrected 1st. This is currently achieved using error-correcting codes in secure sketches that generate helper data through a one-time procedure. As another, we have a tendency to propose key reconciliation protocols. This interactive technique, originating from quantum key distribution, allows two entities to correct errors in their respective correlated keys by discussing over a public channel. We have a tendency to believe that this will additionally be employed by a device and a distant server to agree on two completely different responses to the same challenge from the same PUF obtained at completely different times. This approach has the advantage of requiring very few logic resources on the device side. The knowledge leakage caused by the key reconciliation process is limited and simply computable. Results of implementation on field-programmable gate array (FPGA) targets are presented, showing that it's the most light-weight error-correction module up to now.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE : Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage ABSTRACT: Cloud storage has become a primary industry in remote data management services, but it also attracts security concerns.
PROJECT TITLE : Key Points Estimation and Point Instance Segmentation Approach for Lane Detection ABSTRACT: Techniques of perception used in autonomous vehicles should be adaptable to the various environments they encounter.
PROJECT TITLE : A Fault-Tolerant and Secure Architecture for Key Management in LoRaWAN Based on Permissioned Blockchain ABSTRACT: LoRaWAN is one of the primary technologies that is currently available to enable Low-Power Wide-Area
PROJECT TITLE :Social-Aware Secret Key Generation for Secure Device-to-Device Communication via Trusted and Non-Trusted Relays - 2018ABSTRACT:Physical layer security (PLS) is a promising technology in device-to-device (D2D)
PROJECT TITLE : Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches - 2017 ABSTRACT: Jamming attacks represent a vital vulnerability for wireless secret key generation

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry