Cargando…

Electromagnetically unclonable functions generated by non-Hermitian absorber-emitter

Physically unclonable functions (PUFs) are a class of hardware-specific security primitives based on secret keys extracted from integrated circuits, which can protect important information against cyberattacks and reverse engineering. Here, we put forward an emerging type of PUF in the electromagnet...

Descripción completa

Detalles Bibliográficos
Autores principales: Yang, Minye, Ye, Zhilu, Pan, Hongyi, Farhat, Mohamed, Cetin, Ahmet Enis, Chen, Pai-Yen
Formato: Online Artículo Texto
Lenguaje:English
Publicado: American Association for the Advancement of Science 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10491217/
https://www.ncbi.nlm.nih.gov/pubmed/37682993
http://dx.doi.org/10.1126/sciadv.adg7481
Descripción
Sumario:Physically unclonable functions (PUFs) are a class of hardware-specific security primitives based on secret keys extracted from integrated circuits, which can protect important information against cyberattacks and reverse engineering. Here, we put forward an emerging type of PUF in the electromagnetic domain by virtue of the self-dual absorber-emitter singularity that uniquely exists in the non-Hermitian parity-time (PT)–symmetric structures. At this self-dual singular point, the reconfigurable emissive and absorptive properties with order-of-magnitude differences in scattered power can respond sensitively to admittance or phase perturbations caused by, for example, manufacturing imperfectness. Consequently, the entropy sourced from inevitable manufacturing variations can be amplified, yielding excellent PUF security metrics in terms of randomness and uniqueness. We show that this electromagnetic PUF can be robust against machine learning–assisted attacks based on the Fourier regression and generative adversarial network. Moreover, the proposed PUF concept is wavelength-scalable in radio frequency, terahertz, infrared, and optical systems, paving a promising avenue toward applications of cryptography and encryption.