期刊文献+

一种低成本物理不可克隆函数结构的设计实现及其RFID应用 被引量:10

Design and Implementation of a Low-Cost Physical Unclonable Function and Its Application in RFID
下载PDF
导出
摘要 物理不可克隆函数(PUF:Physical Unclonable Function)是一种新型的加密组件,具有防伪、不可克隆及不可预测等特性.本文提出了一种新型的低成本PUF,与传统PUF相比更适用于无线射频识别(Radio Frequency Identification,RFID)系统.该PUF结构主要由上电密钥生成器和混合函数两部分构成.上电密钥生成器由比特生成器阵列构成,混合函数则由低成本流加密算法构成,其作用是隐藏密钥生成器,以提高安全性.此外,本文还提出了择多模块和多寻认证协议来改善PUF响应及其在RFID系统中的稳定性.实验表明,该PUF的硬件成本低并且具有很好的稳定性,非常适用于RFID系统等资源受限的应用场合. Physical unclonable function (PUF)is a kind of new encryption primitive,which has the properties of an-ti-counterfeiting,unclonability and unpredictability.In this paper,a low-cost PUF design is presented along with its applica-tion into RFID systems.The PUF structure includes two parts:a key generator and a low-cost stream cipher that is used to hide the key.A novel post-processing module i.e.,majority voting,and a new multi-query protocol are introduced to im-prove the stability and reliability.The proposed reliable and low-cost PUF solution is well suitable for RFID applications.
出处 《电子学报》 EI CAS CSCD 北大核心 2016年第7期1772-1776,共5页 Acta Electronica Sinica
基金 国家自然科学基金(No.61401197) 江苏省自然科学基金(No.BK20151477) 南京航空航天大学人才引进启动基金
关键词 物理不可克隆函数 RFID系统 择多模块 多寻认证协议 physical unclonable function RFID majority voting multi-query protocol
  • 相关文献

参考文献17

  • 1Rohrmair U, Holcomb D. PUFs at a glance [ A]. Proceed- ings of Design, Automation and Test in Europe [ C ]. Dres- den, Germany: IEEE,2014,1 - 6.
  • 2Maes R. Physically Unclonable Functions:Constructions, Properties and Applications[ M ]. Berlin Heidelberg: Springer, 2013.
  • 3Pappu R, Recht B, Taylor J, et al. Physical one-way func- tions [ J]. Science,2002,297 (5589) :2026 - 2030.
  • 4Gassend B. Physical Random Functions [ D]. USA: Massa- Chusetts Institute of Technology, 2003.
  • 5Herder C, Yu M, Koushanfar F, et al. Physical unclonable functions and applications : A tutorial [ J ]. Proceedings of the IEEE,2014,102(8) :1126 -1141.
  • 6王晨旭,韩良,喻明艳,王进祥.一种适用于RFID标签的安全化密码算法实现[J].电子学报,2014,42(8):1465-1473. 被引量:4
  • 7Hell M, Johansson T, Maximov A, et al. A stream cipher proposal: Grain- 128 [ A ]. Proceedings of IEEE International Symposium on Information Theory [ C ]. Seattle, WA, USA:IEEE,2006,1614- 1618.
  • 8Yu M, Devadas S. Secure and robust error correction for physical unclonable functions [ J ]. IEEE Design & Test of Computers ,2010,27 ( 1 ) :48 - 65.
  • 9Merli D, Stumpf F, Eckert C. Improving the quality of ring oscillator PUFs on FPGAs [ A ]. Proceedings of the 5th ACM Workshop on Embedded Systems Security [ C ]. Scottsdale, AZ, USA: ACM, 2010,1873548-1873557.
  • 10郭奕旻,李顺东,陈振华,刘新.一种轻量级隐私保护的RFID群组证明协议[J].电子学报,2015,43(2):289-292. 被引量:10

二级参考文献38

  • 1武虎,李少远.基于局部信息的滚动优化与机器人路径规划[J].系统仿真学报,2004,16(8):1680-1682. 被引量:6
  • 2刘道斌,郭莉,白硕.基于Petri网的安全协议形式化分析[J].电子学报,2004,32(11):1926-1929. 被引量:5
  • 3李翔宇,孙义和.采用数据流模式提高乱序执行密码芯片的安全性[J].电子学报,2007,35(2):202-206. 被引量:2
  • 4R Weinstein. RFID: a technical overview and its application to the enterprise[J]. IT professional,2005,7(3) :27 - 33.
  • 5J L M Flores, et al.A performance of RFID tags in near and far field [A]. Proceedings of IEEE International Conference on Personal Wireless Communications (ICPWC) [C]. New Delhi, India: IEEE Press, 2005,143 : 353 - 357.
  • 6M Ohkubo, K Suzuki, S Kinoshita. Hash-chain based forwardsecure privacy protection scheme for low-cost RFID[ A ]. Proceedings of the 2004 Symposium on Cryptography and In-formarion Security (SCIS 2004 ) [C]. Berlin: Springer Verlag Press, 2004.719 - 724.
  • 7S E Sarma, S A Weis,D W Engels. RFID systems and security and privacy implications[ A ]. Proceedings of the 4th International Work-shop on Cryptographic Hardware and Embedded Systems ( CHES2002 ) [C]. Berlin: Springer-Verlag Press, 2003,2: 454 - 469.
  • 8S E Sarma, S A Weis, D W Engels. Radio-frequency identification:Secure risks and challenges[J].RSA Laboratories Cryptobytes, 2003,6(1) :2 - 9.
  • 9S A Weis, S E Satma, R L Rivest, D W Engels. Security and privacy aspects of low-cost radio frequency identification systems[ A]. Proceedings of the 1st International Conference on Security in Pervasive Computing[ C ]. Berlin: Springer Verlag, 2004.201 - 212.
  • 10D Henrici, P Muller. Hash-based entumcement of location 196-vacy for radio-frequency identification devices using varying identifiers[A]. Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW' 04 ) [ C ]. Washington, DC, USA: IEEE Computer Society,2004.149 - 153.

共引文献15

同被引文献56

引证文献10

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部