Polyhedron authentication system through the PUFs cube. a Illustration of generating a PUFs cube obtained from rw-PUF depending on the optic axis (α, β, γ, δ) and storing in a data cloud. b An example of a Miller index capable of extracting from PUFs cube. c The authentication flow of rw-PUF in the authorization request. Authorization can only be granted if multiple authentication codes are successfully verified. d A multidimensional authentication application using PUFs cube, and verification is performed through geometric vertices extracted through different Miller indexes

Polyhedron authentication system through the PUFs cube. a Illustration of generating a PUFs cube obtained from rw-PUF depending on the optic axis (α, β, γ, δ) and storing in a data cloud. b An example of a Miller index capable of extracting from PUFs cube. c The authentication flow of rw-PUF in the authorization request. Authorization can only be granted if multiple authentication codes are successfully verified. d A multidimensional authentication application using PUFs cube, and verification is performed through geometric vertices extracted through different Miller indexes

Source publication
Article
Full-text available
The increased prevalence of the Internet of Things (IoT) and the integration of digital technology into our daily lives have given rise to heightened security risks and the need for more robust security measures. In response to these challenges, physical unclonable functions (PUFs) have emerged as promising solution, offering a highly secure method...

Contexts in source publication

Context 1
... proposed PUFs cube is stored in the cloud, enabling convenient authentication through polarization manipulation (Fig. 6a). The PUF data is also available in various Miller index forms, stored as three-dimensional cubes (Fig. 6b). This enhances the unpredictability of the PUF and strengthens its protection against unauthorized ...
Context 2
... proposed PUFs cube is stored in the cloud, enabling convenient authentication through polarization manipulation (Fig. 6a). The PUF data is also available in various Miller index forms, stored as three-dimensional cubes (Fig. 6b). This enhances the unpredictability of the PUF and strengthens its protection against unauthorized ...
Context 3
... system availability, integrity, and the protection of sensitive information are critical to authentication. Figure 6c shows a straightforward process for the physically random wrinkle-based PUFs step-by-step verification method. Upon receipt of an authentication request from an unknown PUF, a meticulous verification protocol is initiated to assess the randomness, uniqueness, and of the PUF. ...
Context 4
... protocol begins with a physical surface scan and compares the obtained data with the stored data cloud, enabling discrimination between genuine and counterfeit PUFs. We introduce a novel authentication technique, the '3D polyhedron authentication method', which utilizes a PUFs cube created from utterly random and distinct rw-PUFs, as shown in Fig. 6d. For example, specify four vertices in a 3D PUFs cube represented by a coordinate system (i.e., V I , V II , V III , V IV ). The four specified vertices give rise to four faces, creating a triangular pyramid shape (i.e., G 1 , G 2 , G 3 , G 4 ) in accordance with the Euler characteristic. Also, the number of 3D shapes that can be ...
Context 5
... each G (face) functions as a notch in the key, while the data cloud serves as the pin in our approach. A binning process was performed to convert 2D binary code into 1D code (Fig. S6). The 1D code formed by the binary value of the polyhedral face, with an entropy close to 1, demonstrates an unbiased distribution towards '0' or '1', rendering it highly secure. The proposed authentication method exhibits versatile applicability, encompassing secure communication, anti-counterfeiting measures, and access control ...

Citations

... It should be stressed that these five optical responses are generated at any individual position of a single PUF, endowing the PUF with the capability of achieving in situ multidimensionally encoded responses. Hence, an ultrahigh information entropy (up to 2.32 bits/ pixel) is obtained (Supplementary Note 2), which is superior to those of PUFs based on alternative technologies 7,8,10,13,20,[31][32][33][34][50][51][52][53][54] (Supplementary Fig. 4). Each of the five optical responses can be employed to generate a key in a popular form. ...
Article
Full-text available
Integrated circuit anti-counterfeiting based on optical physical unclonable functions (PUFs) plays a crucial role in guaranteeing secure identification and authentication for Internet of Things (IoT) devices. While considerable efforts have been devoted to exploring optical PUFs, two critical challenges remain: incompatibility with the complementary metal-oxide-semiconductor (CMOS) technology and limited information entropy. Here, we demonstrate all-silicon multidimensionally-encoded optical PUFs fabricated by integrating silicon (Si) metasurface and erbium-doped Si quantum dots (Er-Si QDs) with a CMOS-compatible procedure. Five in-situ optical responses have been manifested within a single pixel, rendering an ultrahigh information entropy of 2.32 bits/pixel. The position-dependent optical responses originate from the position-dependent radiation field and Purcell effect. Our evaluation highlights their potential in IoT security through advanced metrics like bit uniformity, similarity, intra- and inter-Hamming distance, false-acceptance and rejection rates, and encoding capacity. We finally demonstrate the implementation of efficient lightweight mutual authentication protocols for IoT applications by using the all-Si multidimensionally-encoded optical PUFs.
Article
Full-text available
In this era of demanding invulnerable security systems against the threat of hacking, physically unclonable functions (PUFs), especially in which can spawn multiple security keys within a single device, has gained attention. This investigation explores the multi‐key generable PUF devices employing organic small molecules, specifically C8‐BTBT and PTCDI‐C13. The variation stems from the formation of irregular PN junctions, haphazardly configured grain boundaries of C8‐BTBT. A comprehensive analysis including scanning electron microscopy (SEM), atomic force microscopy (AFM), kelvin probe force microscopy (KPFM), impedance spectroscopy (IS), and optical simulation, has been substantiated the underlying mechanisms. Exploiting the photo‐responsive characteristics within the light wavelength spectrum of 660 and 530 nm, alongside the electrical characteristics, the capability to generate a total of 30 distinct multi‐security keys in a single device is been successfully. These keys, distinguished by variable parameters such as voltage, light wavelength, and the calculated photo‐to‐dark current ratio (PDCR), manifest novel quantitative and qualitative dimensions in security protocol customization. Inter‐Hamming distance and entropy of these cryptographic keys exhibit commendable averages of 51.9–53.1%, and 0.81, respectively. Moreover, a noteworthy average bit‐aliasing mean value of 51.9%, derived from four distinct batches, underscores the pragmatic feasibility of the proposed conceptual framework for PUF devices.
Article
Physically unclonable functions (PUFs) have attracted growing interest for anticounterfeiting and authentication applications. The practical applications require durable PUFs made of robust materials. This study reports a practical strategy to generate extremely robust PUFs by embedding random features onto a substrate. The chaotic and low-cost electrohydrodynamic deposition process generates random polymeric features over a negative-tone photoresist film. These polymer features function as a conformal photomask, which protects the underlying photoresist from UV light, thereby enabling the generation of randomly positioned holes. Dry plasma etching of the substrate and removal of the photoresist result in the transfer of random features to the underlying silicon substrate. The matching of binary keys and features via different algorithms facilitates authentication of features. The embedded PUFs exhibit extreme levels of thermal (∼1000 °C) and mechanical stability that exceed the state of the art. The strength of this strategy emerges from the PUF generation directly on the substrate of interest, with stability that approaches the intrinsic properties of the underlying material. Benefiting from the materials and processes widely used in the semiconductor industry, this strategy shows strong promise for anticounterfeiting and device security applications.
Article
Full-text available
Optical grating devices based on micro/nanostructured functional surfaces are widely employed to precisely manipulate light propagation, which is significant for information technologies, optical data storage, and light sensors. However, the parameters of rigid periodic structures are difficult to tune after manufacturing, which seriously limits their capacity for in situ light manipulation. Here, a novel anti‐eavesdropping, anti‐damage, and anti‐tamper dynamic optical encryption strategy are reported via tunable mechanical composite wrinkle micrograting encryption systems (MCWGES). By mechanically composing multiple in‐situ tunable ordered wrinkle gratings, the dynamic keys with large space capacity are generated to obtain encrypted diffraction patterns, which can provide a higher level of security for the encrypted systems. Furthermore, a multiple grating cone diffraction model is proposed to reveal the dynamic optical encryption principle of MCWGES. Optical encryption communication using dynamic keys has the effect of preventing eavesdropping, damage, and tampering. This dynamic encryption method based on optical manipulation of wrinkle grating demonstrates the potential applications of micro/nanostructured functional surfaces in the field of information security.