The entropy of keys derived from laser speckle

B. Skoric
DOI: https://doi.org/10.48550/arXiv.0710.5002
2007-10-26
Abstract:Laser speckle has been proposed in a number of papers as a high-entropy source of unpredictable bits for use in security applications. Bit strings derived from speckle can be used for a variety of security purposes such as identification, authentication, anti-counterfeiting, secure key storage, random number generation and tamper protection. The choice of laser speckle as a source of random keys is quite natural, given the chaotic properties of speckle. However, this same chaotic behaviour also causes reproducibility problems. Cryptographic protocols require either zero noise or very low noise in their inputs; hence the issue of error rates is critical to applications of laser speckle in cryptography. Most of the literature uses an error reduction method based on Gabor filtering. Though the method is successful, it has not been thoroughly analysed. In this paper we present a statistical analysis of Gabor-filtered speckle patterns. We introduce a model in which perturbations are described as random phase changes in the source plane. Using this model we compute the second and fourth order statistics of Gabor coefficients. We determine the mutual information between perturbed and unperturbed Gabor coefficients and the bit error rate in the derived bit string. The mutual information provides an absolute upper bound on the number of secure bits that can be reproducibly extracted from noisy measurements.
Cryptography and Security,Computer Vision and Pattern Recognition
What problem does this paper attempt to address?
The problem that this paper attempts to solve is how to quantify the entropy value of the keys generated by laser speckle patterns when they are used for security applications and how to evaluate the influence of noise on key extraction. Specifically, the paper focuses on the following aspects: 1. **Entropy value of key generation**: Laser speckle patterns are proposed as a high - entropy source for generating unpredictable bit strings, which can be used in various security applications, such as authentication, anti - counterfeiting, secure key storage, random number generation and tamper - proof protection. However, although the chaotic characteristics of speckle patterns provide high entropy, they also bring reproducibility problems. Therefore, the paper aims to quantify the entropy value of the keys extracted from speckle patterns through statistical analysis. 2. **Influence of noise on key extraction**: Since the encryption protocol requires almost noiseless or very low - noise input, the noise rate is a key issue in the cryptographic applications of laser speckle. By introducing a random phase change model, the paper studies the influence of noise on the speckle patterns after Gabor transformation and calculates the mutual information and bit error rate. 3. **Statistical characteristics of Gabor transformation**: The paper analyzes in detail the statistical characteristics of the speckle patterns after Gabor transformation, especially calculates the second - order and fourth - order statistics of Gabor coefficients. These statistics are helpful for understanding the influence of noise on key extraction and provide a theoretical framework for evaluating the upper limit of the number of secure bits that can be repeatedly extracted from noise measurements. 4. **Modeling of random perturbations**: The paper proposes a method to simulate the random perturbations of speckle patterns and studies their influence on key extraction by adjusting the intensity of perturbations. Specifically, the phase of each source area of size \(\lambda^2\) will be changed by a small random quantity \(\epsilon\), which is drawn from a uniform distribution with a width of \(2q\). In this way, the paper studies the mutual information and correlation under different noise intensities. ### Main contributions 1. **Analysis of statistical properties of Gabor transformation**: The paper analyzes the statistical properties of Gabor transformation of speckle patterns, proposes a method for calculating arbitrary moments, and shows small deviations of the first four moments. 2. **Information content of Gabor coefficients**: The paper calculates the information content of Gabor coefficients under a given detector noise level and finds that the entropy value per unit typical speckle area is proportional to the square of the logarithm of the signal - to - noise ratio. 3. **Random perturbation model**: The paper introduces a random phase model to simulate the perturbations of speckle patterns and calculates the mutual information between the original speckle "source" before and after perturbation, and the result is proportional to \(\log(\pi/q)\). 4. **Correlation between intensity and Gabor coefficients**: The paper shows that the correlation of intensity before and after perturbation is \(\frac{\sin^2 q}{q^2}\) and obtains the same correlation result. 5. **Experimental results**: The paper provides experimental results to verify theoretical predictions, especially that the empirical distribution function of Gabor coefficients is consistent with the theory and there is a linear relationship between the correlation functions of intensity and Gabor coefficients. Through these analyses and experiments, the paper provides an important theoretical basis and practical guidance for understanding and optimizing the security key generation system based on laser speckle patterns.