[go: up one dir, main page]

Baek et al., 2021 - Google Patents

A reconfigurable SRAM based CMOS PUF with challenge to response pairs

Baek et al., 2021

View PDF
Document ID
4745667580600970133
Author
Baek S
Yu G
Kim J
Ngo C
Eshraghian J
Hong J
Publication year
Publication venue
IEEE Access

External Links

Snippet

This paper presents a reconfigurable SRAM-based physically unclonable function (PUF) topology with multiple challenge-response pairs (CRPs) per cell. The proposed PUF structure enables a very large CRP space by connecting additional pull-up and pull-down …
Continue reading at ieeexplore.ieee.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • G06F7/588Random number generators, i.e. based on natural stochastic processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/50Computer-aided design
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3278Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • HELECTRICITY
    • H03BASIC ELECTRONIC CIRCUITRY
    • H03KPULSE TECHNIQUE
    • H03K3/00Circuits for generating electric pulses; Monostable, bistable or multistable circuits
    • H03K3/84Generating pulses having a predetermined statistical distribution of a parameter, e.g. random pulse generators

Similar Documents

Publication Publication Date Title
Baek et al. A reconfigurable SRAM based CMOS PUF with challenge to response pairs
Hemavathy et al. Arbiter PUF—A review of design, composition, and security aspects
Alioto Trends in hardware security: From basics to ASICs
Yang et al. Hardware designs for security in ultra-low-power IoT systems: An overview and survey
Cao et al. A low power diode-clamped inverter-based strong physical unclonable function for robust and lightweight authentication
Holcomb et al. Power-up SRAM state as an identifying fingerprint and source of true random numbers
Lin et al. Low-power sub-threshold design of secure physical unclonable functions
Baturone et al. Improved generation of identifiers, secret keys, and random numbers from SRAMs
Zhao et al. A 108 F 2/Bit fully reconfigurable RRAM PUF based on truly random dynamic entropy of jitter noise
Cao et al. An energy-efficient current-starved inverter based strong physical unclonable function with enhanced temperature stability
Rahman et al. Systematic correlation and cell neighborhood analysis of SRAM PUF for robust and unique key generation
Li et al. A 215-F² bistable physically unclonable function with an ACF of< 0.005 and a native bit instability of 2.05% in 65-nm CMOS process
Mahalat et al. Implementation, characterization and application of path changing switch based arbiter PUF on FPGA as a lightweight security primitive for IoT
Zhao et al. A 1036-F 2/bit high reliability temperature compensated cross-coupled comparator-based PUF
US11861050B2 (en) SR flip-flop based physical unclonable functions for hardware security
Nam et al. Compact SRAM-based PUF chip employing body voltage control technique
Tehranipoor et al. DVFT: A lightweight solution for power-supply noise-based TRNG using dynamic voltage feedback tuning system
Chatterjee et al. Theory and application of delay constraints in arbiter PUF
Barbareschi et al. A ring oscillator-based identification mechanism immune to aging and external working conditions
Yehoshuva et al. A survey of security attacks on silicon based weak PUF architectures
Ni et al. Pi puf: a processor-intrinsic puf for iot
Tripathy et al. MARPUF: physical unclonable function with improved machine learning attack resistance
Rai et al. Design and analysis of reconfigurable cryptographic primitives: TRNG and PUF
Dehghanzadeh et al. MBM PUF: A multi-bit memory-based physical unclonable function
Bian et al. A chaotic strong transition effect ring oscillator PUF with effective immunity to modeling attacks