Effects of Feature Trimming on Encryption Key Stability for an ICmetric System

The stable reproduction of an encryption key under potentially varying operating conditions is a fundamental requirement of any encryption key generation system. This paper examines aspects of the generation of encryption keys based on measurable features derived from characteristics of investigated electronic system with a view to determining whether such encryption key generation is sufficiently stable. Specifically, it addresses the effect on encryption key stability of removing unstable contributions to the key generation process, a technique known as feature trimming.

[1]  Hao Feng,et al.  Private key generation from on-line handwritten signatures , 2002, Inf. Manag. Comput. Secur..

[2]  W. Gareth J. Howells,et al.  Novel Techniques for Ensuring Secure Communications for Distributed Low Power Devices , 2006, First NASA/ESA Conference on Adaptive Hardware and Systems (AHS'06).

[3]  W. Gareth J. Howells,et al.  Normalizing Discrete Circuit Features with Statistically Independent values for incorporation within a highly Secure Encryption System , 2007, Second NASA/ESA Conference on Adaptive Hardware and Systems (AHS 2007).

[4]  Peter M. Fenwick Variable-length integer codes based on the Goldbach conjecture, and other additive codes , 2002, IEEE Trans. Inf. Theory.

[5]  Andy Adler,et al.  Vulnerabilities in Biometric Encryption Systems , 2005, AVBPA.

[6]  Keinosuke Fukunaga,et al.  Introduction to Statistical Pattern Recognition , 1972 .

[7]  Kohji Fukunaga,et al.  Introduction to Statistical Pattern Recognition-Second Edition , 1990 .

[8]  Yoshua Bengio,et al.  Pattern Recognition and Neural Networks , 1995 .

[9]  Tsuhan Chen,et al.  Biometrics-based cryptographic key generation , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[10]  W. Gareth J. Howells,et al.  Integrating Multi-Modal Circuit Features within an Efficient Encryption System , 2007, Third International Symposium on Information Assurance and Security.

[11]  David Wheeler Protocols Using Keys from Faulty Data , 2001, Security Protocols Workshop.