期刊文献+

基于纠错码模糊提取器的SRAM-PUF设计方法 被引量:4

Design Method of SRAM-PUF Based on Error Correcting Code Fuzzy Extractor
下载PDF
导出
摘要 物理不可克隆函数(Physical Unclonable Function,PUF)是新型的硬件安全技术,利用芯片的"物理指纹"特征实现密钥生成和身份认证等不同功能。提出了一种基于纠错码技术的模糊提取器,用于提高SRAM类PUF的鲁棒性。模糊提取器工作分为生成阶段和重构阶段,生成阶段利用BCH编码产生与PUF响应相关的辅助数据,重构过程利用辅助数据和BCH码的纠错功能重建PUF的稳定响应输出。模糊提取器在ATSAMV70J19处理器上进行实验,在不同的工作温度条件下,其一致性指标可达到99.9%,验证了该方法的有效性。 Physical unclonable function is a new kind of hardware security technology.The physical fingerprint characteristics of the chip are used in many fields such as key generation and identity authentication.The fuzzy extractor based on error correcting code was proposed in this paper to improve the robustness of PUF of SRAM.The working process of fuzzy extractor can be divided into two stages,generation stage and reconfiguration stage.The supplementary data of PUF is created by using BCH encoder method in generation stage.And the stable response output of PUF is created by using supplementary data and the error correcting ability of BCH encoder in reconfiguration stage.The fuzzy extractor experiment is running on ATSAMV70J19 CPU platform and the consistency reaches 99.9% under different operating temperatures.The result of experiment verifies the excellent performance of this method.
出处 《计算机科学》 CSCD 北大核心 2016年第S2期373-376,共4页 Computer Science
关键词 物理不可克隆函数 模糊提取器 纠错码 密码生成 身份认证 Physical unclonable function Fuzzy extractor Error correcting code Key generation Identity authentication
  • 相关文献

参考文献5

二级参考文献88

  • 1韩军,曾晓洋,汤庭鳌.RSA密码算法的功耗轨迹分析及其防御措施[J].计算机学报,2006,29(4):590-596. 被引量:19
  • 2赵佳,曾晓洋,韩军,王晶,陈俊.抗差分功耗分析攻击的AES算法的VLSI实现[J].计算机研究与发展,2007,44(3):378-383. 被引量:7
  • 3童元满,王志英,戴葵,石伟,陆洪毅.基于动态双轨逻辑的抗功耗攻击安全芯片半定制设计流程[J].小型微型计算机系统,2007,28(5):935-939. 被引量:7
  • 4Kocher P,Lee R,et al.Security as a new dimension in embedded system design[C]//DAC 2004.New York:ACM,2004:753-760.
  • 5Kocher P,Jaffe Joshua,Jun Benjamin.Introduction to differential power analysis and related attacks[EB/OL].1998[1998-09-03].http://www.cryptography.com/resources/whitepapers/dpaTechinfo.pdf.
  • 6Kulrd&Scard Consortium.Side channel attacks[R/OL].SCARD SCARD-KULRD-D4.1.http://www.scard-project.org.
  • 7Kocher P,Jaffe J,Jun B.Differential power analysis[C]//Advanced in Cryptology-CRYPTO'99.Berlin:Springer,1999:388-397.
  • 8Brier E,Weierstrass M J.Elliptic curves and side-channel attacks[G]//LNCS 2274:PKC 2002.Berlin:Springer,2002:335-345.
  • 9McEvoy R,et al.Differential power analysis of HMAC based on SHA-2,and counter-measures[G]//LNCS 4867:WISA 2007.Berlin:Springer,2007:317-332.
  • 10Boscher A,Handschuh H.Masking does not protect against differential fault attacks[C]//FDTC 2008.Piscataway,NJ:IEEE,2008:35-40.

共引文献21

同被引文献17

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部