Author:
Yang Hyo-In,Lee Hanbin,Ko Jeonghee,An Yulim,Min Gyeongsu,Kim Dong Myong,Kim Dae Hwan,Bae Jong-Ho,Lim Meehyun,Choi Sung-Jin
Abstract
AbstractCarbon nanotube networks (CNTs)-based devices are well suited for the physically unclonable function (PUF) due to the inherent randomness of the CNT network, but CNT networks can vary significantly during manufacturing due to various controllable process conditions, which have a significant impact on PUF performance. Therefore, optimization of process conditions is essential to have a PUF with excellent performance. However, because it is time-consuming and costly to fabricate directly under various conditions, we implement randomly formed CNT network using simulation and confirm the variable correlation of the CNT network optimized for PUF performance. At the same time, by implementing an analog PUF through simulation, we present a 2D patterned PUF that has excellent security and can compensate for error occurrence problems. To evaluate the performance of analog PUF, a new evaluation method different from the existing digital PUF is proposed, and the PUF performance is compared according to two process variables, CNT density and metallic CNT ratio, and the correlation with PUF performance is confirmed. This study can serve as a basis for research to produce optimized CNT PUF by applying simulation according to the needs of the process of forming a CNT network.
Funder
National Research Foundation of Korea
Publisher
Springer Science and Business Media LLC
Reference34 articles.
1. Lenstra, A. K. et al. Ron was wrong, Whit is right. Cryptology ePrint Archive (2012).
2. Heninger, N., Durumeric, Z., Wustrow, E. & Halderman, J. A. Mining your Ps and Qs: Detection of widespread weak keys in network devices. USENIX Security (2012).
3. Mesaritakis, C. et al. Physical unclonable function based on a multi-mode optical waveguide. Sci. Rep. 8, 9653 (2018).
4. Devadas, S. et al. Design and implementation of PUF-Based “Unclonable” RFID ICs for anti-counterfeiting and security applications. In 2008 IEEE International Conference on RFID 58–64 (2008).
5. Guajardo, J., Kumar, S. S., Schrijen, G.-J. & Tuyls, P. FPGA intrinsic PUFs and their use for IP protection. Cryptograph Hardware Embed. Syst. 4727, 63–80 (2007).