We numerically study a new hardware method for network authentication, using a pair of chaotic lasers subject to the same optical injection from a third chaotic laser, in a close-loop confguration. One laser is in the secure environment, the other is in the unsecure envi ronment, and if their parameters are matched (i.e., they are ‘twins’), in suitable operating conditions they synchronize and generate the same pseudo-random amplitude modulation. Access to the secure environment is authorized only if the two responses are found equal. As in other schemes based on Physical Unclonable Functions (PUFs), security relies on unavoidable small diferences between nominally identical but physically separate devices: due to the strong sensitivity of chaos to laser parameter dispersion, fnding a suitable laser to synchronize is a very difcult task for the Adversary, while the laser of the Authorized user can be selected as a twin of the one in the secure environment.
Network authentication by close-loop synchronized chaotic lasers
Lombardi, Lorenzo;Aromataris, Giuseppe;Annovazzi-Lodi, Valerio
2023-01-01
Abstract
We numerically study a new hardware method for network authentication, using a pair of chaotic lasers subject to the same optical injection from a third chaotic laser, in a close-loop confguration. One laser is in the secure environment, the other is in the unsecure envi ronment, and if their parameters are matched (i.e., they are ‘twins’), in suitable operating conditions they synchronize and generate the same pseudo-random amplitude modulation. Access to the secure environment is authorized only if the two responses are found equal. As in other schemes based on Physical Unclonable Functions (PUFs), security relies on unavoidable small diferences between nominally identical but physically separate devices: due to the strong sensitivity of chaos to laser parameter dispersion, fnding a suitable laser to synchronize is a very difcult task for the Adversary, while the laser of the Authorized user can be selected as a twin of the one in the secure environment.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.