preview

Essay On Cryptographic Primitives

Decent Essays

Physically unclonable cryptographic primitives are promising for securing the rapidly grow-ing number of electronic devices. Here, we introduce a new class of physically unclonableprimitives from layered molybdenum disulfide (MoS2) by leveraging the natural randomnessof their island growth during chemical vapor deposition (CVD). We synthesize a MoS2mono-layer film covered with speckles of multilayer islands, where the growth process is engineeredfor an optimal speckle density. Using the Clark-Evans test, we confirm that the distributionof islands on the film exhibits complete spatial randomness,i.e.true randomness. Such aproperty is highly desirable for constructing unpredictable cryptographic primitives. The se-curity primitive is an …show more content…

As a result, authentication of electronic devices andinformation has become increasingly important. Physically unclonable functions (PUFs) areamong promising security primitives for entity identification or cryptographic key genera-tion4,5. A variety of PUFs have used manufacturing variability6,7or materials disorders8–13for generating a security keyon demand. Specifically, applying a challenge (such as anelectrical or an optical stimulus) to a PUF produces a unique response (a security key).Hence, this concept generates security keys that are unique for each electronic device. APUF construct must be easy to produce at low cost and yet have a physical structure that isimpossible to replicate,i.e.physically unclonable. Notably, the physical unclonability andthe uniqueness of the response are the core defining properties of a PUF5.Silicon-based PUFs have garnered significant attention in the past decade as a poten-tial low-cost solution for securing digital systems due to their compatibility with the com-plementary metal-oxide-semiconductor (CMOS) technology7. However, to date, all siliconPUFs require extensive data processing to enhance the robustness and uniqueness of theirresponse5,14,15. For instance, applying a number of procedures involving error correction,masking of unreliable bits, and addition of helper data improves the robustness against envi-ronmental factors, while using other

Get Access