In this paper, we numerically evaluate a hardware-based method for authentication using a pair of twin chaotic lasers. This method belongs to the PUF (Physically Unclonable Function) class; however, it does not require storing the response of the hardware in a database, because both users own the same hardware (one of the twin chaotic lasers), producing, on the fly, the same response, i.e., the same chaotic waveform, when subject to the same stimulus (injection from a third laser) in the same working conditions (local injection, pump current). A bit sequence can be easily obtained from the chaotic waveforms by electronic processing, and authentication consists in comparing the sequences produced by the twin lasers. This scheme is proposed above all for authentication of a client in an unsecure environment to a server in a secure environment, but it can be used also for peer-to-peer authentication. Both the case of open- and close-loop chaotic lasers are considered. Simulations are based on the Lang-Kobayashi model.

Challenge-Response Authentication Scheme with Chaotic Lasers

Annovazzi-Lodi V.
Conceptualization
;
Lombardi L.
Software
;
Aromataris G.
Software
2022

Abstract

In this paper, we numerically evaluate a hardware-based method for authentication using a pair of twin chaotic lasers. This method belongs to the PUF (Physically Unclonable Function) class; however, it does not require storing the response of the hardware in a database, because both users own the same hardware (one of the twin chaotic lasers), producing, on the fly, the same response, i.e., the same chaotic waveform, when subject to the same stimulus (injection from a third laser) in the same working conditions (local injection, pump current). A bit sequence can be easily obtained from the chaotic waveforms by electronic processing, and authentication consists in comparing the sequences produced by the twin lasers. This scheme is proposed above all for authentication of a client in an unsecure environment to a server in a secure environment, but it can be used also for peer-to-peer authentication. Both the case of open- and close-loop chaotic lasers are considered. Simulations are based on the Lang-Kobayashi model.
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: http://hdl.handle.net/11571/1447690
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? 0
social impact