Van-Toan Tran, Quang-Kien Trinh, Tri-Hieu Le, Tung-Lam Nguyen, Van‐Phuc Hoang
{"title":"Highly Secure Data Encryption Devices Using Unique Physically Unclonable Key","authors":"Van-Toan Tran, Quang-Kien Trinh, Tri-Hieu Le, Tung-Lam Nguyen, Van‐Phuc Hoang","doi":"10.1109/NICS54270.2021.9701548","DOIUrl":null,"url":null,"abstract":"Physically Unclonable Functions (PUFs) exploit intrinsic mismatch of physical devices to form devicespecific data that uniqueness, reliability and unpredictable. PUF find important applications in hardware security as identification and authentication, secure key generation. In this work we proposed a crypto key extraction scheme using RO-PUF, that can be used for critical security applications. Specifically, we practically demonstrated that the extracted key can be used for data encryption devices by AES cipher. The encryption devices hence become unique and physically unclonable. The encrypted data is highly secure in the sense that the key is intrinsically stored inside the device is theoretically unknown even to direct owners.","PeriodicalId":296963,"journal":{"name":"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NICS54270.2021.9701548","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Physically Unclonable Functions (PUFs) exploit intrinsic mismatch of physical devices to form devicespecific data that uniqueness, reliability and unpredictable. PUF find important applications in hardware security as identification and authentication, secure key generation. In this work we proposed a crypto key extraction scheme using RO-PUF, that can be used for critical security applications. Specifically, we practically demonstrated that the extracted key can be used for data encryption devices by AES cipher. The encryption devices hence become unique and physically unclonable. The encrypted data is highly secure in the sense that the key is intrinsically stored inside the device is theoretically unknown even to direct owners.