3rd International ICST Symposium on Information Assurance and Security

Research Article

Integrating Multi-Modal Circuit Features within an Efficient Encryption System

  • @INPROCEEDINGS{10.1109/IAS.2007.27,
        author={Evangelos Papoutsis and Gareth Howells and Andrew Hopkins and Klaus  McDonald-Maier},
        title={Integrating Multi-Modal Circuit Features within an Efficient Encryption System},
        proceedings={3rd International ICST Symposium on  Information Assurance and Security},
        publisher={IEEE},
        proceedings_a={IAS},
        year={2007},
        month={9},
        keywords={Biometrics  Character generation  Cryptography  Data security  Electronic circuits  Hardware  Humans  Information security  Intelligent sensors  Pattern recognition},
        doi={10.1109/IAS.2007.27}
    }
    
  • Evangelos Papoutsis
    Gareth Howells
    Andrew Hopkins
    Klaus McDonald-Maier
    Year: 2007
    Integrating Multi-Modal Circuit Features within an Efficient Encryption System
    IAS
    IEEE
    DOI: 10.1109/IAS.2007.27
Evangelos Papoutsis1,*, Gareth Howells1,*, Andrew Hopkins2,*, Klaus McDonald-Maier2,*
  • 1: Department of Electronics University of Kent, Canterbury, Kent, UK. Tel: +44(0)1227 82372
  • 2: Department of Computing and Electronic Systems, University of Essex, Colchester, UK.
*Contact email: ep49@kent.ac.uk, W.G.J.Howells@kent.ac.uk, ahopkins@essex.ac.uk, kdm@essex.ac.uk

Abstract

The problem of the incorporation of pattern features with unusual distributions is well known within pattern recognition systems even if not easily addressed. The problem is more acute when features are derived from characteristics of given integrated electronic circuits. The current paper introduces novel efficient techniques for normalising sets of features which are highly multi-modal in nature, so as to allow them to be incorporated within a single encryption key generation system based primarily on measured hardware characteristics. The utility of the proposed system lies in the observation that the need for data sent to and from remote network nodes to be secure and verified is substantial. Security can be improved by using encryption techniques based on keys, which are based on unique properties of the individual nodes within the network. This will serve both to minimize the need for key storage and sharing as well as to validate the initiator node of a message.