[go: up one dir, main page]

Lee et al., 2019 - Google Patents

RC PUF: A low-cost and an easy-to-design PUF for resource-constrained IoT devices

Lee et al., 2019

Document ID
9467956370439956714
Author
Lee S
Oh M
Kang Y
Choi D
Publication year
Publication venue
International Workshop on Information Security Applications

External Links

Snippet

A physically unclonable function (PUF) is a security primitive that can generate device- specific cryptographic information by extracting the features of hardware uncertainty. Despite the advantages of PUFs introduced over the past decade, the majority of them have to be …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3278Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Similar Documents

Publication Publication Date Title
Maes et al. Physically unclonable functions: A study on the state of the art and future research directions
US10211993B2 (en) Analog push pull amplifier-based physically unclonable function for hardware security
Wan et al. An invasive-attack-resistant PUF based on switched-capacitor circuit
Zhao et al. A 108 F 2/Bit fully reconfigurable RRAM PUF based on truly random dynamic entropy of jitter noise
Baek et al. A reconfigurable SRAM based CMOS PUF with challenge to response pairs
He et al. ASCH-PUF: A “Zero” Bit error rate CMOS physically unclonable function with dual-mode low-cost stabilization
KR20170094326A (en) Reliability enhancement methods for physically unclonable function bitstring generation
Li et al. An area-efficient microprocessor-based SoC with an instruction-cache transformable to an ambient temperature sensor and a physically unclonable function
WO2008015603A1 (en) Device and method for generating a random bit string
US11983303B2 (en) Intrinsic data generation device, semiconductor device and authentication system
Lee et al. RC PUF: A low-cost and an easy-to-design PUF for resource-constrained IoT devices
Zhang et al. A SC PUF standard cell used for key generation and anti-invasive-attack protection
Zhao et al. A 1036-F 2/bit high reliability temperature compensated cross-coupled comparator-based PUF
Yan et al. On-chip thermal profiling to detect malicious activity: System-level concepts and design of key building blocks
Liu et al. An entropy-source-preselection-based strong puf with strong resilience to machine learning attacks and high energy efficiency
Bryant et al. A brief tutorial on mixed signal approaches to combat electronic counterfeiting
CN108875417B (en) Method for generating a PUF signature and device having a PUF
Park et al. A metal-via resistance based physically unclonable function with backend incremental adc
Sadr et al. Weighted Hamming distance for PUF performance evaluation
Vooka et al. Capacitance‐to‐digital converter for leaky capacitive sensors
Yamashita et al. Redshift: Manipulating signal propagation delay via continuous-wave lasers
Lin et al. A compact ultra-low power physical unclonable function based on time-domain current difference measurement
Yu et al. Leveraging balanced logic gates as strong PUFs for securing IoT against malicious attacks
Sudhanya et al. Study of different silicon physical unclonable functions
Lee et al. RC PUF: A Low-Cost and an Easy-to-Design