DocumentCode
119871
Title
Cryptographie key generation from PUF data using efficient fuzzy extractors
Author
Hyunho Kang ; Hori, Yoichi ; Katashita, Toshihiro ; Hagiwara, Manabu ; Iwamura, Keiichi
Author_Institution
Dept. of Electr. Eng., Tokyo Univ. of Sci., Tokyo, Japan
fYear
2014
fDate
16-19 Feb. 2014
Firstpage
23
Lastpage
26
Abstract
Physical unclonable functions (PUFs) and biometrics are inherently noisy. When used in practice as cryptographic key generators, they need to be combined with an extraction technique to derive reliable bit strings (i.e., cryptographic key). An approach based on an error correcting code was proposed by Dodis et al. and is known as a fuzzy extractor. However, this method appears to be difficult for non-specialists to implement. In our recent study, we reported the results of some example implementations using PUF data and presented a detailed implementation diagram. In this paper, we describe a more efficient implementation method by replacing the hash function output with the syndrome from the BCH code. The experimental results show that the Hamming distance between two keys vary according to the key size and information-theoretic security has been achieved.
Keywords
Hamming codes; cryptography; error correction codes; fuzzy set theory; BCH code; Hamming distance; PUF data; biometrics; cryptographic key generation; efficient fuzzy extractors; error correcting code; information-theoretic security; physical unclonable functions; reliable bit strings; Cryptography; Data mining; Entropy; Hamming distance; High definition video; Indexes; Reliability; Arbiter PUF; Fuzzy Extractor; Physical Unclonable Functions;
fLanguage
English
Publisher
ieee
Conference_Titel
Advanced Communication Technology (ICACT), 2014 16th International Conference on
Conference_Location
Pyeongchang
Print_ISBN
978-89-968650-2-5
Type
conf
DOI
10.1109/ICACT.2014.6778915
Filename
6778915
Link To Document