A Novel Security Key Generation Method for SRAM PUF Based on Fourier Analysis
Most of the current security key generation schemes for static random access memory physical unclonable function (SRAM PUF) are based on a fuzzy extractor. However, it is difficult to deploy the fuzzy extractor in resource-constrained systems since the implementation of error correcting codes is com...
Gespeichert in:
Veröffentlicht in: | IEEE access 2018-01, Vol.6, p.49576-49587 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 49587 |
---|---|
container_issue | |
container_start_page | 49576 |
container_title | IEEE access |
container_volume | 6 |
creator | Liu, Wenchao Lu, Zhaojun Liu, Hailong Min, Run Zeng, Zhangfan Liu, Zhenglin |
description | Most of the current security key generation schemes for static random access memory physical unclonable function (SRAM PUF) are based on a fuzzy extractor. However, it is difficult to deploy the fuzzy extractor in resource-constrained systems since the implementation of error correcting codes is complicated and requires huge processing resources. To this end, we propose a novel security key generation method for SRAM PUF based on a Fourier analysis. The SRAM PUF Boolean function is introduced to describe the power-up behavior of an SRAM device, which is followed by its Fourier spectrums. By exploring spectrums of the SRAM device, it is observed that the sign-bits of Fourier coefficients at certain generalized frequency points are randomly distributed and noise resistant. As such, the generalized frequency points as well as the sign-bits are suggested for security key generation in conjunction with a sign-bit encoding algorithm. The proposed method is well compared with the conventional fuzzy extractor. It is highlighted that error correcting code will not be involved in the whole lifecycle. Consequently, the method is suitable for the resource-constrained system applications. The proposed method is performed through couple of real measurements on two different platforms. The experimental results show that 8-kB SRAM cells have sufficient entropy for 128-bit security key generation. |
doi_str_mv | 10.1109/ACCESS.2018.2868824 |
format | Article |
fullrecord | <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_ieee_primary_8457188</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8457188</ieee_id><doaj_id>oai_doaj_org_article_78275ac343c34915a9f368347e380c45</doaj_id><sourcerecordid>2455916192</sourcerecordid><originalsourceid>FETCH-LOGICAL-c408t-5d702925237cc7ac3f4fc1e4d4f1173ed92fd0717040cc5141d00e109b5bbd9d3</originalsourceid><addsrcrecordid>eNpNUU1LAzEQXURB0f4CLwHPW_O5SY7rYlW0KtaeQ5rM6pbaaLIV-u9NXSkODDPMzHvD4xXFOcFjQrC-rJvmejYbU0zUmKpKKcoPihNKKl0ywarDf_1xMUppiXOoPBLypJjW6DF8wwrNwG1i12_RPWzRDawh2r4LazSF_j141IaIZi_1FD3PJ-jKJvAoLychYyCiem1X29Sls-KotasEo796Wswn16_NbfnwdHPX1A-l41j1pfASU00FZdI5aR1reesIcM9bQiQDr2nrsSQSc-ycIJx4jCFrXYjFwmvPTou7gdcHuzSfsfuwcWuC7czvIMQ3Y2PfuRUYqagU-QVnOTURVresUoxLYAo7LjLXxcD1GcPXBlJvlllVFpQM5UJoUhFN8xUbrlwMKUVo918JNjsbzGCD2dlg_mzIqPMB1QHAHqG4kEQp9gOb64AS</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455916192</pqid></control><display><type>article</type><title>A Novel Security Key Generation Method for SRAM PUF Based on Fourier Analysis</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Liu, Wenchao ; Lu, Zhaojun ; Liu, Hailong ; Min, Run ; Zeng, Zhangfan ; Liu, Zhenglin</creator><creatorcontrib>Liu, Wenchao ; Lu, Zhaojun ; Liu, Hailong ; Min, Run ; Zeng, Zhangfan ; Liu, Zhenglin</creatorcontrib><description>Most of the current security key generation schemes for static random access memory physical unclonable function (SRAM PUF) are based on a fuzzy extractor. However, it is difficult to deploy the fuzzy extractor in resource-constrained systems since the implementation of error correcting codes is complicated and requires huge processing resources. To this end, we propose a novel security key generation method for SRAM PUF based on a Fourier analysis. The SRAM PUF Boolean function is introduced to describe the power-up behavior of an SRAM device, which is followed by its Fourier spectrums. By exploring spectrums of the SRAM device, it is observed that the sign-bits of Fourier coefficients at certain generalized frequency points are randomly distributed and noise resistant. As such, the generalized frequency points as well as the sign-bits are suggested for security key generation in conjunction with a sign-bit encoding algorithm. The proposed method is well compared with the conventional fuzzy extractor. It is highlighted that error correcting code will not be involved in the whole lifecycle. Consequently, the method is suitable for the resource-constrained system applications. The proposed method is performed through couple of real measurements on two different platforms. The experimental results show that 8-kB SRAM cells have sufficient entropy for 128-bit security key generation.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2018.2868824</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Algorithms ; Boolean algebra ; Boolean functions ; Entropy ; Error correcting codes ; Error correction ; Error correction & detection ; Error correction codes ; Fourier analysis ; key generation ; Noise measurement ; PUF ; Random access memory ; Resistance ; Security ; SRAM ; Static random access memory</subject><ispartof>IEEE access, 2018-01, Vol.6, p.49576-49587</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c408t-5d702925237cc7ac3f4fc1e4d4f1173ed92fd0717040cc5141d00e109b5bbd9d3</citedby><cites>FETCH-LOGICAL-c408t-5d702925237cc7ac3f4fc1e4d4f1173ed92fd0717040cc5141d00e109b5bbd9d3</cites><orcidid>0000-0001-6139-4128</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8457188$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,860,2095,27612,27903,27904,54911</link.rule.ids></links><search><creatorcontrib>Liu, Wenchao</creatorcontrib><creatorcontrib>Lu, Zhaojun</creatorcontrib><creatorcontrib>Liu, Hailong</creatorcontrib><creatorcontrib>Min, Run</creatorcontrib><creatorcontrib>Zeng, Zhangfan</creatorcontrib><creatorcontrib>Liu, Zhenglin</creatorcontrib><title>A Novel Security Key Generation Method for SRAM PUF Based on Fourier Analysis</title><title>IEEE access</title><addtitle>Access</addtitle><description>Most of the current security key generation schemes for static random access memory physical unclonable function (SRAM PUF) are based on a fuzzy extractor. However, it is difficult to deploy the fuzzy extractor in resource-constrained systems since the implementation of error correcting codes is complicated and requires huge processing resources. To this end, we propose a novel security key generation method for SRAM PUF based on a Fourier analysis. The SRAM PUF Boolean function is introduced to describe the power-up behavior of an SRAM device, which is followed by its Fourier spectrums. By exploring spectrums of the SRAM device, it is observed that the sign-bits of Fourier coefficients at certain generalized frequency points are randomly distributed and noise resistant. As such, the generalized frequency points as well as the sign-bits are suggested for security key generation in conjunction with a sign-bit encoding algorithm. The proposed method is well compared with the conventional fuzzy extractor. It is highlighted that error correcting code will not be involved in the whole lifecycle. Consequently, the method is suitable for the resource-constrained system applications. The proposed method is performed through couple of real measurements on two different platforms. The experimental results show that 8-kB SRAM cells have sufficient entropy for 128-bit security key generation.</description><subject>Algorithms</subject><subject>Boolean algebra</subject><subject>Boolean functions</subject><subject>Entropy</subject><subject>Error correcting codes</subject><subject>Error correction</subject><subject>Error correction & detection</subject><subject>Error correction codes</subject><subject>Fourier analysis</subject><subject>key generation</subject><subject>Noise measurement</subject><subject>PUF</subject><subject>Random access memory</subject><subject>Resistance</subject><subject>Security</subject><subject>SRAM</subject><subject>Static random access memory</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNUU1LAzEQXURB0f4CLwHPW_O5SY7rYlW0KtaeQ5rM6pbaaLIV-u9NXSkODDPMzHvD4xXFOcFjQrC-rJvmejYbU0zUmKpKKcoPihNKKl0ywarDf_1xMUppiXOoPBLypJjW6DF8wwrNwG1i12_RPWzRDawh2r4LazSF_j141IaIZi_1FD3PJ-jKJvAoLychYyCiem1X29Sls-KotasEo796Wswn16_NbfnwdHPX1A-l41j1pfASU00FZdI5aR1reesIcM9bQiQDr2nrsSQSc-ycIJx4jCFrXYjFwmvPTou7gdcHuzSfsfuwcWuC7czvIMQ3Y2PfuRUYqagU-QVnOTURVresUoxLYAo7LjLXxcD1GcPXBlJvlllVFpQM5UJoUhFN8xUbrlwMKUVo918JNjsbzGCD2dlg_mzIqPMB1QHAHqG4kEQp9gOb64AS</recordid><startdate>20180101</startdate><enddate>20180101</enddate><creator>Liu, Wenchao</creator><creator>Lu, Zhaojun</creator><creator>Liu, Hailong</creator><creator>Min, Run</creator><creator>Zeng, Zhangfan</creator><creator>Liu, Zhenglin</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0001-6139-4128</orcidid></search><sort><creationdate>20180101</creationdate><title>A Novel Security Key Generation Method for SRAM PUF Based on Fourier Analysis</title><author>Liu, Wenchao ; Lu, Zhaojun ; Liu, Hailong ; Min, Run ; Zeng, Zhangfan ; Liu, Zhenglin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c408t-5d702925237cc7ac3f4fc1e4d4f1173ed92fd0717040cc5141d00e109b5bbd9d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Algorithms</topic><topic>Boolean algebra</topic><topic>Boolean functions</topic><topic>Entropy</topic><topic>Error correcting codes</topic><topic>Error correction</topic><topic>Error correction & detection</topic><topic>Error correction codes</topic><topic>Fourier analysis</topic><topic>key generation</topic><topic>Noise measurement</topic><topic>PUF</topic><topic>Random access memory</topic><topic>Resistance</topic><topic>Security</topic><topic>SRAM</topic><topic>Static random access memory</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Liu, Wenchao</creatorcontrib><creatorcontrib>Lu, Zhaojun</creatorcontrib><creatorcontrib>Liu, Hailong</creatorcontrib><creatorcontrib>Min, Run</creatorcontrib><creatorcontrib>Zeng, Zhangfan</creatorcontrib><creatorcontrib>Liu, Zhenglin</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Liu, Wenchao</au><au>Lu, Zhaojun</au><au>Liu, Hailong</au><au>Min, Run</au><au>Zeng, Zhangfan</au><au>Liu, Zhenglin</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Novel Security Key Generation Method for SRAM PUF Based on Fourier Analysis</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2018-01-01</date><risdate>2018</risdate><volume>6</volume><spage>49576</spage><epage>49587</epage><pages>49576-49587</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Most of the current security key generation schemes for static random access memory physical unclonable function (SRAM PUF) are based on a fuzzy extractor. However, it is difficult to deploy the fuzzy extractor in resource-constrained systems since the implementation of error correcting codes is complicated and requires huge processing resources. To this end, we propose a novel security key generation method for SRAM PUF based on a Fourier analysis. The SRAM PUF Boolean function is introduced to describe the power-up behavior of an SRAM device, which is followed by its Fourier spectrums. By exploring spectrums of the SRAM device, it is observed that the sign-bits of Fourier coefficients at certain generalized frequency points are randomly distributed and noise resistant. As such, the generalized frequency points as well as the sign-bits are suggested for security key generation in conjunction with a sign-bit encoding algorithm. The proposed method is well compared with the conventional fuzzy extractor. It is highlighted that error correcting code will not be involved in the whole lifecycle. Consequently, the method is suitable for the resource-constrained system applications. The proposed method is performed through couple of real measurements on two different platforms. The experimental results show that 8-kB SRAM cells have sufficient entropy for 128-bit security key generation.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2018.2868824</doi><tpages>12</tpages><orcidid>https://orcid.org/0000-0001-6139-4128</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2169-3536 |
ispartof | IEEE access, 2018-01, Vol.6, p.49576-49587 |
issn | 2169-3536 2169-3536 |
language | eng |
recordid | cdi_ieee_primary_8457188 |
source | IEEE Open Access Journals; DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | Algorithms Boolean algebra Boolean functions Entropy Error correcting codes Error correction Error correction & detection Error correction codes Fourier analysis key generation Noise measurement PUF Random access memory Resistance Security SRAM Static random access memory |
title | A Novel Security Key Generation Method for SRAM PUF Based on Fourier Analysis |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-25T07%3A09%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Novel%20Security%20Key%20Generation%20Method%20for%20SRAM%20PUF%20Based%20on%20Fourier%20Analysis&rft.jtitle=IEEE%20access&rft.au=Liu,%20Wenchao&rft.date=2018-01-01&rft.volume=6&rft.spage=49576&rft.epage=49587&rft.pages=49576-49587&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2018.2868824&rft_dat=%3Cproquest_ieee_%3E2455916192%3C/proquest_ieee_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2455916192&rft_id=info:pmid/&rft_ieee_id=8457188&rft_doaj_id=oai_doaj_org_article_78275ac343c34915a9f368347e380c45&rfr_iscdi=true |