Fig. 3: Flowchart of cryptographic key generation from an edible PUF device. | Nature Communications

Fig. 3: Flowchart of cryptographic key generation from an edible PUF device.

From: Edible unclonable functions

Fig. 3

Randomly distributed fluorescent silk microparticles provide an entropy source. An input challenge (Cn) is determined by a set of the excitation and emission bands, which is optimized for each type of fluorescent silk (i.e., eCFP, eGFP, eYFP, and mKate2 silk). The corresponding fluorescent image acts as an output response (Rn). A resultant digitized key (Kn) is generated by undergoing four steps in the extractor. The extractor is designed to generate uniform and reproducible digital keys after data acquisitions of fluorescent images. For each response returns in a 64-bit binary key, a total key size of this PUF is 256 bits. The key size can further be enhanced by an increase in the density of fluorescent silk particles in the PUF device or by additional combinations of excitation and emission bands (Supplementary Fig. 11).

Back to article page