Van-Toan Tran, Quang-Kien Trinh, Tri-Hieu Le, Tung-Lam Nguyen, Van‐Phuc Hoang
{"title":"使用唯一物理不可克隆密钥的高度安全数据加密设备","authors":"Van-Toan Tran, Quang-Kien Trinh, Tri-Hieu Le, Tung-Lam Nguyen, Van‐Phuc Hoang","doi":"10.1109/NICS54270.2021.9701548","DOIUrl":null,"url":null,"abstract":"Physically Unclonable Functions (PUFs) exploit intrinsic mismatch of physical devices to form devicespecific data that uniqueness, reliability and unpredictable. PUF find important applications in hardware security as identification and authentication, secure key generation. In this work we proposed a crypto key extraction scheme using RO-PUF, that can be used for critical security applications. Specifically, we practically demonstrated that the extracted key can be used for data encryption devices by AES cipher. The encryption devices hence become unique and physically unclonable. The encrypted data is highly secure in the sense that the key is intrinsically stored inside the device is theoretically unknown even to direct owners.","PeriodicalId":296963,"journal":{"name":"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Highly Secure Data Encryption Devices Using Unique Physically Unclonable Key\",\"authors\":\"Van-Toan Tran, Quang-Kien Trinh, Tri-Hieu Le, Tung-Lam Nguyen, Van‐Phuc Hoang\",\"doi\":\"10.1109/NICS54270.2021.9701548\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Physically Unclonable Functions (PUFs) exploit intrinsic mismatch of physical devices to form devicespecific data that uniqueness, reliability and unpredictable. PUF find important applications in hardware security as identification and authentication, secure key generation. In this work we proposed a crypto key extraction scheme using RO-PUF, that can be used for critical security applications. Specifically, we practically demonstrated that the extracted key can be used for data encryption devices by AES cipher. The encryption devices hence become unique and physically unclonable. The encrypted data is highly secure in the sense that the key is intrinsically stored inside the device is theoretically unknown even to direct owners.\",\"PeriodicalId\":296963,\"journal\":{\"name\":\"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)\",\"volume\":\"48 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NICS54270.2021.9701548\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NICS54270.2021.9701548","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Highly Secure Data Encryption Devices Using Unique Physically Unclonable Key
Physically Unclonable Functions (PUFs) exploit intrinsic mismatch of physical devices to form devicespecific data that uniqueness, reliability and unpredictable. PUF find important applications in hardware security as identification and authentication, secure key generation. In this work we proposed a crypto key extraction scheme using RO-PUF, that can be used for critical security applications. Specifically, we practically demonstrated that the extracted key can be used for data encryption devices by AES cipher. The encryption devices hence become unique and physically unclonable. The encrypted data is highly secure in the sense that the key is intrinsically stored inside the device is theoretically unknown even to direct owners.