Exploiting Lithography Limits for Hardware Security Applications

R.S. Khan, H. Silva, N. Noor, C. Jin, S. Muneer, F. Dirisaglik, A. Cywar, P.H. Nguyen, M. Van Dijk, A. Gokirmak

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

© 2019 IEEE.Hardware security primitives such as physical obfuscated keys (POKs) allow tamper-resistant storage of random keys based on manufacturing or physical variability. The output bits of existing POK designs need to be first corrected due to measurement noise using error correction methods and then de-correlated by privacy amplification processes. These additional requirements increase the hardware overhead and reduce the efficiency of the system. In this work, we propose an intrinsically reliable POK design capable of generating random bits by exploiting the limits of the lithographic process for a given technology. Our design does not require any error correction and requires only XOR circuits for privacy amplification which reduces the hardware overhead of the whole system.
Original languageEnglish
Title of host publication19th IEEE International Conference on Nanotechnology, NANO 2019
PublisherIEEE Computer Society
Pages9-12
ISBN (Electronic)9781728128917
DOIs
Publication statusPublished - 1 Jul 2019
Externally publishedYes
Event19th IEEE International Conference on Nanotechnology, NANO 2019 - Macau, China
Duration: 22 Jul 201926 Jul 2019

Publication series

NameProceedings of the IEEE Conference on Nanotechnology
ISSN (Print)1944-9399
ISSN (Electronic)1944-9380

Conference

Conference19th IEEE International Conference on Nanotechnology, NANO 2019
Country/TerritoryChina
CityMacau
Period22/07/1926/07/19

Funding

*This research is supported by the multi-university research initiative (MURI) of Air Force Office of Scientific Research (AFOSR) under the grant FA9550-14-1-0351Z.

FundersFunder number
National Science Foundation1711626
Air Force Office of Scientific ResearchFA9550-14-1-0351Z

    Fingerprint

    Dive into the research topics of 'Exploiting Lithography Limits for Hardware Security Applications'. Together they form a unique fingerprint.

    Cite this