Periodic Reporting for period 1 - SQPRIM (Secure post-quantum cryptographic primitives)
Reporting period: 2023-07-01 to 2025-06-30
To reinforce security in the cyberspace, hardware-based security techniques are being developed to generate strong digital identifiers. In this case, the set of identification attributes are based on physical features that can uniquely represent a specific entity. For example, manufacturing variability inherent to microelectronic circuits can be exploited to derive a digital footprint. Silicon Physical unclonable functions (PUFs) are circuits responsible for generating a digital identity for the device. In essence, a PUF is the hardware implementation of a mathematical one-way function, i.e. a numerical function where the mapping from input to output is nonlinear (this is also known as challenge-response pair, CRP). The nonlinear mapping is realised by the physical uncertainties, which are intrinsically unique for each entity. Moreover, this allows an easy probing of the PUF while the non-invertibility of the one-way function prevents the prediction of the output, which makes the digital identity strong. In electronics, common cost-effective implementations of PUFs exploit the random power-up bias of memory cells or the statistical delay variations of identical circuits. However, these electronic PUFs have been classified as weak, since the underlying physical scrambling mechanism of the one-way function is rather simplistic, which makes them vulnerable to modelling attacks. In addition, with the expecting capabilities of future quantum computing, stronger solutions are required.
Optical implementations are a viable alternative for realising strong PUFs for the post-quantum era. Current implementations propose exploiting complex physical mechanisms with high entropy, such as multiple scattering or multimode interference inside disordered three-dimensional microstructures. The outputs are typically optical intensity maps or transmission spectra that are later converted through a digital process into an identity, i.e. a bit string used in authorisation protocols. These physical mechanisms are computationally difficult to simulate and thus these PUFs are more robust against modelling attacks. However, the systems employed to derive the digital identity from those PUFs are typically complex, bulky and prone to error. Most works propose methods for probing the PUFs which require the physical displacement of the laser beam, rotation of the PUF, or costly equipment such as tunable lasers and spectrometers.
This project aimed to make a contribution in the development of optical cryptographic primitives that remain safe in the post-quantum era. In particular, the project addressed three of the main challenges ahead for making optical PUFs a reality: improving reliability, enhancing robustness and enabling miniaturisation.
The project contributed to developing strong PUFs by demonstrating a method to operate optical PUFs which allowed a high number of CRPs. The acousto-optic effect was used to control the travel path of a light beam transmitted through a scattering medium to generate unique patterns. This was due to the photoelastic properties of materials, by which the strain of an acoustic plane wave travelling through a medium causes variations in the refractive index of that medium. As a result, the acoustic waves create an optical grating, the characteristics of which depend on the photoelasticity of the medium, the strain of the acoustic wave, and its frequency. The acousto-optic effect has been exploited to develop a series of devices such as optical modulators, beam deflectors, and frequency shifters. However, it has never been employed in the field of hardware security to develop physical unclonable functions. This novel method can potentially generate a high number of unique patterns while reducing the cost and complexity compared to current systems exploiting optical PUFs. In addition, this method is compatible with the miniaturisation of the device, which is of relevance to enable its application to miniaturised devices such as IoT.
•Proposing the exploitation of porosity at nanometric scale as a reliable source of entropy for deriving physical identity.
•Assessing the confidentiality, survivability, and integrity of cryptographic keys generated by optical PUFs, by studying the impact of external conditions.
•Demonstrating a novel method for operating PUFs based on the acousto-optic effect which can lead to the miniaturisation of the solutions and their future commercial exploitation.
•Exploration of the implementation of optical PUFs in photonic integrated devices to enable their use in Internet-of-Things (IoT) devices.