Author:
Lombardi Lorenzo,Aromataris Giuseppe,Annovazzi-Lodi Valerio
Abstract
AbstractWe numerically study a new hardware method for network authentication, using a pair of chaotic lasers subject to the same optical injection from a third chaotic laser, in a close-loop configuration. One laser is in the secure environment, the other is in the unsecure environment, and if their parameters are matched (i.e., they are ‘twins’), in suitable operating conditions they synchronize and generate the same pseudo-random amplitude modulation. Access to the secure environment is authorized only if the two responses are found equal. As in other schemes based on Physical Unclonable Functions (PUFs), security relies on unavoidable small differences between nominally identical but physically separate devices: due to the strong sensitivity of chaos to laser parameter dispersion, finding a suitable laser to synchronize is a very difficult task for the Adversary, while the laser of the Authorized user can be selected as a twin of the one in the secure environment.
Funder
Dipartimento di Ingegneria Industriale e dell'Informazione, Università di Pavia
Università degli Studi di Pavia
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Atomic and Molecular Physics, and Optics,Electronic, Optical and Magnetic Materials
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献