A Novel Security Key Generation Method for SRAM PUF Based on Fourier Analysis

Most of the current security key generation schemes for static random access memory physical unclonable function (SRAM PUF) are based on a fuzzy extractor. However, it is difficult to deploy the fuzzy extractor in resource-constrained systems since the implementation of error correcting codes is com...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE access 2018-01, Vol.6, p.49576-49587
Hauptverfasser: Liu, Wenchao, Lu, Zhaojun, Liu, Hailong, Min, Run, Zeng, Zhangfan, Liu, Zhenglin
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 49587
container_issue
container_start_page 49576
container_title IEEE access
container_volume 6
creator Liu, Wenchao
Lu, Zhaojun
Liu, Hailong
Min, Run
Zeng, Zhangfan
Liu, Zhenglin
description Most of the current security key generation schemes for static random access memory physical unclonable function (SRAM PUF) are based on a fuzzy extractor. However, it is difficult to deploy the fuzzy extractor in resource-constrained systems since the implementation of error correcting codes is complicated and requires huge processing resources. To this end, we propose a novel security key generation method for SRAM PUF based on a Fourier analysis. The SRAM PUF Boolean function is introduced to describe the power-up behavior of an SRAM device, which is followed by its Fourier spectrums. By exploring spectrums of the SRAM device, it is observed that the sign-bits of Fourier coefficients at certain generalized frequency points are randomly distributed and noise resistant. As such, the generalized frequency points as well as the sign-bits are suggested for security key generation in conjunction with a sign-bit encoding algorithm. The proposed method is well compared with the conventional fuzzy extractor. It is highlighted that error correcting code will not be involved in the whole lifecycle. Consequently, the method is suitable for the resource-constrained system applications. The proposed method is performed through couple of real measurements on two different platforms. The experimental results show that 8-kB SRAM cells have sufficient entropy for 128-bit security key generation.
doi_str_mv 10.1109/ACCESS.2018.2868824
format Article
fullrecord <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_ieee_primary_8457188</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8457188</ieee_id><doaj_id>oai_doaj_org_article_78275ac343c34915a9f368347e380c45</doaj_id><sourcerecordid>2455916192</sourcerecordid><originalsourceid>FETCH-LOGICAL-c408t-5d702925237cc7ac3f4fc1e4d4f1173ed92fd0717040cc5141d00e109b5bbd9d3</originalsourceid><addsrcrecordid>eNpNUU1LAzEQXURB0f4CLwHPW_O5SY7rYlW0KtaeQ5rM6pbaaLIV-u9NXSkODDPMzHvD4xXFOcFjQrC-rJvmejYbU0zUmKpKKcoPihNKKl0ywarDf_1xMUppiXOoPBLypJjW6DF8wwrNwG1i12_RPWzRDawh2r4LazSF_j141IaIZi_1FD3PJ-jKJvAoLychYyCiem1X29Sls-KotasEo796Wswn16_NbfnwdHPX1A-l41j1pfASU00FZdI5aR1reesIcM9bQiQDr2nrsSQSc-ycIJx4jCFrXYjFwmvPTou7gdcHuzSfsfuwcWuC7czvIMQ3Y2PfuRUYqagU-QVnOTURVresUoxLYAo7LjLXxcD1GcPXBlJvlllVFpQM5UJoUhFN8xUbrlwMKUVo918JNjsbzGCD2dlg_mzIqPMB1QHAHqG4kEQp9gOb64AS</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455916192</pqid></control><display><type>article</type><title>A Novel Security Key Generation Method for SRAM PUF Based on Fourier Analysis</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Liu, Wenchao ; Lu, Zhaojun ; Liu, Hailong ; Min, Run ; Zeng, Zhangfan ; Liu, Zhenglin</creator><creatorcontrib>Liu, Wenchao ; Lu, Zhaojun ; Liu, Hailong ; Min, Run ; Zeng, Zhangfan ; Liu, Zhenglin</creatorcontrib><description>Most of the current security key generation schemes for static random access memory physical unclonable function (SRAM PUF) are based on a fuzzy extractor. However, it is difficult to deploy the fuzzy extractor in resource-constrained systems since the implementation of error correcting codes is complicated and requires huge processing resources. To this end, we propose a novel security key generation method for SRAM PUF based on a Fourier analysis. The SRAM PUF Boolean function is introduced to describe the power-up behavior of an SRAM device, which is followed by its Fourier spectrums. By exploring spectrums of the SRAM device, it is observed that the sign-bits of Fourier coefficients at certain generalized frequency points are randomly distributed and noise resistant. As such, the generalized frequency points as well as the sign-bits are suggested for security key generation in conjunction with a sign-bit encoding algorithm. The proposed method is well compared with the conventional fuzzy extractor. It is highlighted that error correcting code will not be involved in the whole lifecycle. Consequently, the method is suitable for the resource-constrained system applications. The proposed method is performed through couple of real measurements on two different platforms. The experimental results show that 8-kB SRAM cells have sufficient entropy for 128-bit security key generation.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2018.2868824</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Algorithms ; Boolean algebra ; Boolean functions ; Entropy ; Error correcting codes ; Error correction ; Error correction &amp; detection ; Error correction codes ; Fourier analysis ; key generation ; Noise measurement ; PUF ; Random access memory ; Resistance ; Security ; SRAM ; Static random access memory</subject><ispartof>IEEE access, 2018-01, Vol.6, p.49576-49587</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c408t-5d702925237cc7ac3f4fc1e4d4f1173ed92fd0717040cc5141d00e109b5bbd9d3</citedby><cites>FETCH-LOGICAL-c408t-5d702925237cc7ac3f4fc1e4d4f1173ed92fd0717040cc5141d00e109b5bbd9d3</cites><orcidid>0000-0001-6139-4128</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8457188$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,860,2095,27612,27903,27904,54911</link.rule.ids></links><search><creatorcontrib>Liu, Wenchao</creatorcontrib><creatorcontrib>Lu, Zhaojun</creatorcontrib><creatorcontrib>Liu, Hailong</creatorcontrib><creatorcontrib>Min, Run</creatorcontrib><creatorcontrib>Zeng, Zhangfan</creatorcontrib><creatorcontrib>Liu, Zhenglin</creatorcontrib><title>A Novel Security Key Generation Method for SRAM PUF Based on Fourier Analysis</title><title>IEEE access</title><addtitle>Access</addtitle><description>Most of the current security key generation schemes for static random access memory physical unclonable function (SRAM PUF) are based on a fuzzy extractor. However, it is difficult to deploy the fuzzy extractor in resource-constrained systems since the implementation of error correcting codes is complicated and requires huge processing resources. To this end, we propose a novel security key generation method for SRAM PUF based on a Fourier analysis. The SRAM PUF Boolean function is introduced to describe the power-up behavior of an SRAM device, which is followed by its Fourier spectrums. By exploring spectrums of the SRAM device, it is observed that the sign-bits of Fourier coefficients at certain generalized frequency points are randomly distributed and noise resistant. As such, the generalized frequency points as well as the sign-bits are suggested for security key generation in conjunction with a sign-bit encoding algorithm. The proposed method is well compared with the conventional fuzzy extractor. It is highlighted that error correcting code will not be involved in the whole lifecycle. Consequently, the method is suitable for the resource-constrained system applications. The proposed method is performed through couple of real measurements on two different platforms. The experimental results show that 8-kB SRAM cells have sufficient entropy for 128-bit security key generation.</description><subject>Algorithms</subject><subject>Boolean algebra</subject><subject>Boolean functions</subject><subject>Entropy</subject><subject>Error correcting codes</subject><subject>Error correction</subject><subject>Error correction &amp; detection</subject><subject>Error correction codes</subject><subject>Fourier analysis</subject><subject>key generation</subject><subject>Noise measurement</subject><subject>PUF</subject><subject>Random access memory</subject><subject>Resistance</subject><subject>Security</subject><subject>SRAM</subject><subject>Static random access memory</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNUU1LAzEQXURB0f4CLwHPW_O5SY7rYlW0KtaeQ5rM6pbaaLIV-u9NXSkODDPMzHvD4xXFOcFjQrC-rJvmejYbU0zUmKpKKcoPihNKKl0ywarDf_1xMUppiXOoPBLypJjW6DF8wwrNwG1i12_RPWzRDawh2r4LazSF_j141IaIZi_1FD3PJ-jKJvAoLychYyCiem1X29Sls-KotasEo796Wswn16_NbfnwdHPX1A-l41j1pfASU00FZdI5aR1reesIcM9bQiQDr2nrsSQSc-ycIJx4jCFrXYjFwmvPTou7gdcHuzSfsfuwcWuC7czvIMQ3Y2PfuRUYqagU-QVnOTURVresUoxLYAo7LjLXxcD1GcPXBlJvlllVFpQM5UJoUhFN8xUbrlwMKUVo918JNjsbzGCD2dlg_mzIqPMB1QHAHqG4kEQp9gOb64AS</recordid><startdate>20180101</startdate><enddate>20180101</enddate><creator>Liu, Wenchao</creator><creator>Lu, Zhaojun</creator><creator>Liu, Hailong</creator><creator>Min, Run</creator><creator>Zeng, Zhangfan</creator><creator>Liu, Zhenglin</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0001-6139-4128</orcidid></search><sort><creationdate>20180101</creationdate><title>A Novel Security Key Generation Method for SRAM PUF Based on Fourier Analysis</title><author>Liu, Wenchao ; Lu, Zhaojun ; Liu, Hailong ; Min, Run ; Zeng, Zhangfan ; Liu, Zhenglin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c408t-5d702925237cc7ac3f4fc1e4d4f1173ed92fd0717040cc5141d00e109b5bbd9d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Algorithms</topic><topic>Boolean algebra</topic><topic>Boolean functions</topic><topic>Entropy</topic><topic>Error correcting codes</topic><topic>Error correction</topic><topic>Error correction &amp; detection</topic><topic>Error correction codes</topic><topic>Fourier analysis</topic><topic>key generation</topic><topic>Noise measurement</topic><topic>PUF</topic><topic>Random access memory</topic><topic>Resistance</topic><topic>Security</topic><topic>SRAM</topic><topic>Static random access memory</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Liu, Wenchao</creatorcontrib><creatorcontrib>Lu, Zhaojun</creatorcontrib><creatorcontrib>Liu, Hailong</creatorcontrib><creatorcontrib>Min, Run</creatorcontrib><creatorcontrib>Zeng, Zhangfan</creatorcontrib><creatorcontrib>Liu, Zhenglin</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Liu, Wenchao</au><au>Lu, Zhaojun</au><au>Liu, Hailong</au><au>Min, Run</au><au>Zeng, Zhangfan</au><au>Liu, Zhenglin</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Novel Security Key Generation Method for SRAM PUF Based on Fourier Analysis</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2018-01-01</date><risdate>2018</risdate><volume>6</volume><spage>49576</spage><epage>49587</epage><pages>49576-49587</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Most of the current security key generation schemes for static random access memory physical unclonable function (SRAM PUF) are based on a fuzzy extractor. However, it is difficult to deploy the fuzzy extractor in resource-constrained systems since the implementation of error correcting codes is complicated and requires huge processing resources. To this end, we propose a novel security key generation method for SRAM PUF based on a Fourier analysis. The SRAM PUF Boolean function is introduced to describe the power-up behavior of an SRAM device, which is followed by its Fourier spectrums. By exploring spectrums of the SRAM device, it is observed that the sign-bits of Fourier coefficients at certain generalized frequency points are randomly distributed and noise resistant. As such, the generalized frequency points as well as the sign-bits are suggested for security key generation in conjunction with a sign-bit encoding algorithm. The proposed method is well compared with the conventional fuzzy extractor. It is highlighted that error correcting code will not be involved in the whole lifecycle. Consequently, the method is suitable for the resource-constrained system applications. The proposed method is performed through couple of real measurements on two different platforms. The experimental results show that 8-kB SRAM cells have sufficient entropy for 128-bit security key generation.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2018.2868824</doi><tpages>12</tpages><orcidid>https://orcid.org/0000-0001-6139-4128</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2169-3536
ispartof IEEE access, 2018-01, Vol.6, p.49576-49587
issn 2169-3536
2169-3536
language eng
recordid cdi_ieee_primary_8457188
source IEEE Open Access Journals; DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
subjects Algorithms
Boolean algebra
Boolean functions
Entropy
Error correcting codes
Error correction
Error correction & detection
Error correction codes
Fourier analysis
key generation
Noise measurement
PUF
Random access memory
Resistance
Security
SRAM
Static random access memory
title A Novel Security Key Generation Method for SRAM PUF Based on Fourier Analysis
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-25T07%3A09%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Novel%20Security%20Key%20Generation%20Method%20for%20SRAM%20PUF%20Based%20on%20Fourier%20Analysis&rft.jtitle=IEEE%20access&rft.au=Liu,%20Wenchao&rft.date=2018-01-01&rft.volume=6&rft.spage=49576&rft.epage=49587&rft.pages=49576-49587&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2018.2868824&rft_dat=%3Cproquest_ieee_%3E2455916192%3C/proquest_ieee_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2455916192&rft_id=info:pmid/&rft_ieee_id=8457188&rft_doaj_id=oai_doaj_org_article_78275ac343c34915a9f368347e380c45&rfr_iscdi=true