Description
Cryptographic applications require random, unique and unpredictable keys. Since most cryptosystems need to access the key several times, it usually has to be stored permanently. This is a potential vulnerability regarding security, even if a protected memory is used as key storage. Implementing secure key generation and storage is therefore an important and challenging task which can be accomplished by Physical Unclonable Funtions (PUFs). PUFs are, typically digital, circuits that possess an intrinsic random- ness due to process variations which occur during manufacturing. They evaluate these variations and can therefore be used to generate secure cryptographic keys. It is not necessary to store these keys in a protected memory since they are implicitly stored in the PUF and can be repro- duced on demand. However, the results when reproducing a key vary, which can be interpreted as errors. Thus, error correction must be used in order to compensate this effect. We explain how methods from coding theory are applied in order to ensure reliable key reproduction. Previous work on this topic used stan- dard constructions, e.g. an ordinary concatenated scheme of a BCH and Repetition code. Based on this work we show how better results can be obtained using code classes and decoding principles not used for this sce- nario before. We exemplify these methods by specific code constructions which improve existing codes with respect to error probability, decoding complexity and codeword length. Examples based on Generalized Con- catenated, Reed-Muller and Reed-Solomon codes are given.
Prochains exposés
-
Polytopes in the Fiat-Shamir with Aborts Paradigm
Orateur : Hugo Beguinet - ENS Paris / Thales
The Fiat-Shamir with Aborts paradigm (FSwA) uses rejection sampling to remove a secret’s dependency on a given source distribution. Recent results revealed that unlike the uniform distribution in the hypercube, both the continuous Gaussian and the uniform distribution within the hypersphere minimise the rejection rate and the size of the proof of knowledge. However, in practice both these[…]-
Cryptographie
-
Primitive asymétrique
-
Mode et protocole
-
-
Post-quantum Group-based Cryptography
Orateur : Delaram Kahrobaei - The City University of New York