基于SRAM-PUF的秘钥提取方案设计
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Key extraction schemes based on SRAM-PUF
  • 作者:邵健 ; 周昱 ; 秦亦灵 ; 胡鹏
  • 英文作者:SHAO Jian;ZHOU Yu;QIN Yi-ling;HU Peng;China Electronic Technology Group Corporation No.58 Research Institute;
  • 关键词:SRAM ; PUF ; 激励响应对 ; 密钥提取 ; RS码
  • 英文关键词:SRAM PUF;;challenge response pair;;key extraction;;RS code
  • 中文刊名:GWDZ
  • 英文刊名:Electronic Design Engineering
  • 机构:中国电子科技集团公司第58研究所;
  • 出版日期:2019-07-05
  • 出版单位:电子设计工程
  • 年:2019
  • 期:v.27;No.411
  • 语种:中文;
  • 页:GWDZ201913007
  • 页数:5
  • CN:13
  • ISSN:61-1477/TN
  • 分类号:36-40
摘要
物理不可克隆函数(PUF)为硬件提供了安全有效的防物理侵入式攻击的机制,而SRAM PUF是其中应用最为广泛的一种。而为了在输入相同的激励时,得到唯一、随机的密钥,本文根据不同SRAM PUF电路芯片上电复位值的实验结果,针对不同的芯片,设计了直接判断法和基于模糊提取器两种密钥提取方案。模糊提取器分为生成阶段和重建阶段,在生成阶段采用里德-所罗门(Reed-Solomon,RS)码产生辅助数据,在重建阶段利用RS码译码输出稳定的响应序列。最后利用ARM和FPGA仿真平台验证了基于RS纠错码的模糊提取器方案,仿真结果表明RS码可以有效的纠正响应序列中产生的随机错误。
        The physical unclonable functions technique provides hardware with security-effective mechanism to avoid physically invasive attack,and SRAM PUF is one of most widely used PUF. In order to acquire unique and random keys when the same challenge is transmitted,key extraction schemes based on direct judgment and fuzzy extractor are proposed for different types of SRAM on chips according to experiment results for the power up values of SRAM PUF circuit. The process of fuzzy extractor can be divided into generation stage and reconfiguration stage. In generation stage,the supplementary data is created by using Reed-Solomon(RS)code,and the stable response could be obtained by adopting RS code in reconfiguration stage. Additionally, the proposed method is confirmed effectiveness by simulations of ARM and FPGA,the simulation results shows that the random error in response can be corrected by RS code.
引文
[1]庞子涵,周强,高文超,等. FPGA物理不可克隆函数及其实现技术[J].计算机辅助设计与图形学学报,2017,29(9):1590-1603.
    [2] PAPPU R. Physical One-way functions[D]. PhD thesis,MIT,2001.
    [3]郭丽敏,刘丹,王立辉,等.基于PUF的RFID系统安全密钥协商协议[J].微电子学与计算机,2017,34(7):60-64.
    [4] Maes R,Verbauwhede I. Physically Unclonable Functions:a Study on the State of the Art and Future Research Directions[M]. Berlin Heidelberg:Springer-Verlag,2010.
    [5]李雪营,李磊,胡剑浩,等.基于RO电路变化PUF的FPGA实现[J].电子技术应用,2018(5):39-44.
    [6] Gassend B,Clarke D,Dijk M V,et al. Silicon physical random functions[C]//Computer Security Applications Conference,2002:148-160.
    [7] Machida T,Yamamoto D,Iwamoto M,et al. Implementation of double arbiter PUF and its performance evaluation on FPGA[C]//Design Automation Conference. IEEE,2015.
    [8] Shimizu K,Suzuki D,Kasuya T. Glitch PUF:Extracting information from usually unwanted glitches[J]. Ieice Transactions on Fundamentals of Electronics Communications&Computer Sciences,2012,95-A(1):223-233.
    [9] Kumar S S,Guajardo J,Maes R,et al. Extended abstract:The butterfly PUF protecting IP on every FPGA[C]//IEEE International Workshop on Hardware-Oriented Security and Trust. Anaheim,CA,USA:IEEE computer society,2008:67-70.
    [10]Filip Kodytek, Róbert Lórencz. Proposal and properties of ring oscillator-based PUF on FPGA[J]. Journal of Circuits,Systems,and Computers,2016,25(3):1640016.
    [11]Guajardo J,Kumar S S,Schrijen G J,et al. FPGA Intrinsic PUFs and their use for iP protection[C]//International Workshop on Cryptographic Hardware and Embedded Systems. Springer-Verlag,2007:63-80
    [12]Zhang X,Wang P,Zhang Y. Highly stable data SRAM-PUF in 65nm CMOS process[C]//IEEE,International Conference on Asic. IEEE,2014:1-4.
    [13]李刚,汪鹏君,张跃军,等.基于SRAMPUF电路的AES算法设计[J].数学的实践与认识,2015,45(9):125-131.
    [14]Ozturk E, Hammouri G, Sunar B. Physical unclonable function with tristate buffers[C]//IEEE International Symposium on Circuits and Systems.IEEE,2008:3194-3197.
    [15]He Zhang-qing,Zheng Zhao-xia,Dai Kui,et al.Low-cost RFID authentication protocol based on PUFJ. Journal of Computer Applcations 2012,32(3):683-685.
    [16]Maes R. Physically Unclonable Functions:Constructions Properties and Applications[M]. New York,NY,USA:Springer Berlin,2013.
    [17]张亮亮,张翌维,孙瑞一,等.可用于SRAM PUF的密钥提取方案[J].北京大学学报:自然科学版,2017,53(6):997-1002.
    [18]杜宇峰.信道编码分析识别技术研究[D].西安:西安电子科技大学,2012.
    [19]Reed I S, Solomon G. Polynomial codes over certain finite fields[J]. Journal of the Society for Industrial&Applied Mathematics,1960,8(2):300-304.
    [20]Lin S,Costello D J. Error control coding,second edition[M]. Prentice-Hall,Inc. 2004.
    [21]徐太忠,杨天池,程娟,等.基于纠错码模糊提取器的SRAM-PUF设计方法[J].计算机科学,2016,43(S2):373-376.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700