Physical unclonable functions with improved robustness based on polar codes

Since physical unclonable functions (PUFs) are considered for various security applications such as authentication and key generation, the robustness of PUFs is vital. In prior works, various error correction codes, such as Bose-Chaudhuri-Hocquenghem (BCH) codes, were used to improve the robustness of PUFs. In this paper, we use polar codes, a new family of error correction codes, to improve the robustness of PUFs. Our results show that when compared with BCH codes, although polar codes have smaller minimum Hamming distances, they are more resistant to severe environmental effects.

[1]  Erdal Arikan,et al.  Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels , 2008, IEEE Transactions on Information Theory.

[2]  Ying Su,et al.  A 1.6pJ/bit 96% Stable Chip-ID Generating Circuit using Process Variations , 2007, 2007 IEEE International Solid-State Circuits Conference. Digest of Technical Papers.

[3]  Roel Maes,et al.  Physically Unclonable Functions , 2012, Springer Berlin Heidelberg.

[4]  Rüdiger L. Urbanke,et al.  Polar codes: Characterization of exponent, bounds, and constructions , 2009, 2009 IEEE International Symposium on Information Theory.

[5]  Alexander Vardy,et al.  Fast Polar Decoders: Algorithm and Implementation , 2013, IEEE Journal on Selected Areas in Communications.

[6]  Alexander Vardy,et al.  List decoding of polar codes , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.

[7]  Alexander Vardy,et al.  Flexible and Low-Complexity Encoding and Decoding of Systematic Polar Codes , 2016, IEEE Transactions on Communications.

[8]  John R. Barry,et al.  Polar codes for partial response channels , 2013, 2013 IEEE International Conference on Communications (ICC).

[9]  Emre Telatar,et al.  Polarization for arbitrary discrete memoryless channels , 2009, 2009 IEEE Information Theory Workshop.

[10]  Erdal Arikan,et al.  Systematic Polar Coding , 2011, IEEE Communications Letters.

[11]  Rüdiger L. Urbanke,et al.  Polar Codes for Channel and Source Coding , 2009, ArXiv.

[12]  Himanshu Kaul,et al.  16.2 A 0.19pJ/b PVT-variation-tolerant hybrid physically unclonable function circuit for 100% stable secure key generation in 22nm CMOS , 2014, 2014 IEEE International Solid-State Circuits Conference Digest of Technical Papers (ISSCC).

[13]  Emre Telatar,et al.  On the correlation between polarized BECs , 2013, 2013 IEEE International Symposium on Information Theory.

[14]  E. Arkan,et al.  A performance comparison of polar codes and Reed-Muller codes , 2008, IEEE Communications Letters.

[15]  Blaise L. P. Gassend,et al.  Physical random functions , 2003 .

[16]  Emad Alsusa,et al.  On enhancing the minimum Hamming distance of polar codes , 2016, 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[17]  Ahmad-Reza Sadeghi,et al.  Efficient Helper Data Key Extractor on FPGAs , 2008, CHES.

[18]  Srinivas Devadas,et al.  Lightweight and Secure PUF Key Storage Using Limits of Machine Learning , 2011, CHES.