Key Reconciliation Protocols for Error Correction of Silicon PUF Responses - 2017


Physical unclonable functions (PUFs) are promising primitives for the light-weight authentication of an integrated circuit (IC). Indeed, by extracting an identifier from random method variations, they allow each instance of a design to be uniquely identified. However, the extracted identifiers don't seem to be stable enough for use as is, and hence, need to be corrected 1st. This is currently achieved using error-correcting codes in secure sketches that generate helper data through a one-time procedure. As another, we have a tendency to propose key reconciliation protocols. This interactive technique, originating from quantum key distribution, allows two entities to correct errors in their respective correlated keys by discussing over a public channel. We have a tendency to believe that this will additionally be employed by a device and a distant server to agree on two completely different responses to the same challenge from the same PUF obtained at completely different times. This approach has the advantage of requiring very few logic resources on the device side. The knowledge leakage caused by the key reconciliation process is limited and simply computable. Results of implementation on field-programmable gate array (FPGA) targets are presented, showing that it's the most light-weight error-correction module up to now.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE :Social-Aware Secret Key Generation for Secure Device-to-Device Communication via Trusted and Non-Trusted Relays - 2018ABSTRACT:Physical layer security (PLS) is a promising technology in device-to-device (D2D)
PROJECT TITLE : Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches - 2017 ABSTRACT: Jamming attacks represent a vital vulnerability for wireless secret key generation
PROJECT TITLE : Topological Properties of Secure Wireless Sensor Networks Under the q-Composite Key Pre-distribution Scheme With Unreliable Links - 2017 ABSTRACT: Security is a vital issue in wireless sensor networks (WSNs),
PROJECT TITLE : Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications - 2017 ABSTRACT: Authenticated key exchange (AKE) is one of the most important applications in applied cryptography, where a
PROJECT TITLE : Provably Secure Dynamic Id-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model Sign In Or Purchase - 2017 ABSTRACT: Authenticated key exchange (AKE) protocol permits a

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry