-
Fast and Robust Speckle Pattern Authentication by Scale Invariant Feature Transform algorithm in Physical Unclonable Functions
Authors:
Giuseppe Emanuele Lio,
Mauro Daniel Luigi Bruno,
Francesco Riboli,
Sara Nocentini,
Antonio Ferraro
Abstract:
Nowadays, due to the growing phenomenon of forgery in many fields, the interest in developing new anti-counterfeiting device and cryptography keys, based on the Physical Unclonable Functions (PUFs) paradigm, is widely increased. PUFs are physical hardware with an intrinsic, irreproducible disorder that allows for on-demand cryptographic key extraction. Among them, optical PUF are characterized by…
▽ More
Nowadays, due to the growing phenomenon of forgery in many fields, the interest in developing new anti-counterfeiting device and cryptography keys, based on the Physical Unclonable Functions (PUFs) paradigm, is widely increased. PUFs are physical hardware with an intrinsic, irreproducible disorder that allows for on-demand cryptographic key extraction. Among them, optical PUF are characterized by a large number of degrees of freedom resulting in higher security and higher sensitivity to environmental conditions. While these promising features led to the growth of advanced fabrication strategies and materials for new PUF devices, their combination with robust recognition algorithm remains largely unexplored. In this work, we present a metric-independent authentication approach that leverages the Scale Invariant Feature Transform (SIFT) algorithm to extract unique and invariant features from the speckle patterns generated by optical Physical Unclonable Functions (PUFs). The application of SIFT to the challenge response pairs (CRPs) protocol allows us to correctly authenticate a client while denying any other fraudulent access. In this way, the authentication process is highly reliable even in presence of response rotation, zooming, and cropping that may occur in consecutive PUF interrogations and to which other postprocessing algorithm are highly sensitive. This characteristics together with the speed of the method (tens of microseconds for each operation) broaden the applicability and reliability of PUF to practical high-security authentication or merchandise anti-counterfeiting.
△ Less
Submitted 28 April, 2025;
originally announced April 2025.
-
Physical Realization of a Hyper Unclonable Function
Authors:
Sara Nocentini,
Ulrich Rührmair,
Mauro Barni,
Diederik S. Wiersma,
Francesco Riboli
Abstract:
Disordered photonic structures are promising materials for the realization of physical unclonable functions (PUF), physical objects that can overcome the limitations of conventional digital security methods and that enable cryptographic protocols immune against attacks by future quantum computers. One PUF limitation, so far, has been that their physical configuration is either fixed or can only be…
▽ More
Disordered photonic structures are promising materials for the realization of physical unclonable functions (PUF), physical objects that can overcome the limitations of conventional digital security methods and that enable cryptographic protocols immune against attacks by future quantum computers. One PUF limitation, so far, has been that their physical configuration is either fixed or can only be permanently modified, and hence allowing only one token per device. We show that it is possible to overcome this limitation by creating a reconfigurable structure made by light-transformable polymers, in which the physical structure of the unclonable function itself can be reversibly reconfigured. We term this novel concept Hyper PUF or HPUF in that it allows a large number of physical unclonable functions to co-exist simultaneously within one and the same device. The physical transformation of the structure is done all-optically in a reversible and spatially controlled fashion. Our novel technology provides a massive enhancement in security generating more complex keys containing a larger amount of information. At the same time, it allows for new applications, for example serving multiple clients on a single encryption device and the practical implementation of quantum secure authentication of data.
△ Less
Submitted 3 March, 2023; v1 submitted 23 December, 2022;
originally announced January 2023.
-
Quantifying the Sensitivity and Unclonability of Optical Physical Unclonable Functions
Authors:
Giuseppe Emanuele Lio,
Sara Nocentini,
Lorenzo Pattelli,
Eleonora Cara,
Diederik Sybolt Wiersma,
Ulrich Rührmair,
Francesco Riboli
Abstract:
Due to their unmatched entropy, complexity, and security level, optical Physical Unclonable Functions (PUFs) currently receive a lot of interest in the literature. Despite the large body of existing works, however, one of their core features has never been quantified in detail, namely their physical unclonability. This paper tackles this fundamental and yet largely unaddressed issue. In simulation…
▽ More
Due to their unmatched entropy, complexity, and security level, optical Physical Unclonable Functions (PUFs) currently receive a lot of interest in the literature. Despite the large body of existing works, however, one of their core features has never been quantified in detail, namely their physical unclonability. This paper tackles this fundamental and yet largely unaddressed issue. In simulations and/or experiments, the sensitivity of diffraction-based optical responses is investigated with respect to various small alterations such as variation in the position, size, and number of the scatterers, as well as perturbations in the spatial alignment between the physical unclonable function (PUF) and the measurement apparatus. Our analysis focuses on 2D optical PUFs because of their relevance in integrated applications and the need to reply to security concerns that can be raised when the physical structure of the geometry is accessible. Among the results of this study, the sensitivity analysis shows that a positional perturbation of scatterers on the order of \SI{30}{\nano\meter}, i.e., far below the wavelength of the probing laser light of \SI{632}{\nano\meter} wavelength, is sufficient to invalidate the PUF response and thus detect a forgery attempt. These results support and quantify the high adversarial efforts required to clone optical PUFs, even for 2D layouts.
△ Less
Submitted 29 July, 2022;
originally announced August 2022.