CN106385316A - PUF fuzzy extraction circuit and method - Google Patents

PUF fuzzy extraction circuit and method Download PDF

Info

Publication number
CN106385316A
CN106385316A CN201610794033.7A CN201610794033A CN106385316A CN 106385316 A CN106385316 A CN 106385316A CN 201610794033 A CN201610794033 A CN 201610794033A CN 106385316 A CN106385316 A CN 106385316A
Authority
CN
China
Prior art keywords
hamming code
module
puf
majority voting
response
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610794033.7A
Other languages
Chinese (zh)
Other versions
CN106385316B (en
Inventor
谢小东
任子木
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201610794033.7A priority Critical patent/CN106385316B/en
Publication of CN106385316A publication Critical patent/CN106385316A/en
Application granted granted Critical
Publication of CN106385316B publication Critical patent/CN106385316B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3278Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Lock And Its Accessories (AREA)
  • Error Detection And Correction (AREA)

Abstract

A PUF fuzzy extraction circuit relates to electronic technologies. The PUF fuzzy extraction circuit comprises a majority voting module, a Hamming code coding module and an error correction module; the majority voting module carries out majority voting on different bits of response data generated by the same excitation, a majority voting result serves as an output result of the majority voting module, and the response data is response data in response to the same excitation source for at least three times; the Hamming code coding module carries out Hamming coding on the output result of the majority voting module; the error correction module stores auxiliary Hamming codes generated in an initial stage, and compares output of the Hamming code module with the auxiliary Hamming codes to detect error information and output a final response; and the output end of the majority voting module is connected with the input end of the Hamming code coding module, and the output end of the Hamming code coding module is connected with the input end of the error correcting module. The amount of logic resources consumed by the PUF fuzzy extraction circuit is much lower than that of a fuzzy extraction circuit realized by BCH error correcting codes.

Description

PUF obscures and extracts circuit and method
Technical field
The present invention relates to electronic technology.
Background technology
In the last few years, with smart card, RFID (Radio Frequency IDentification, RF identification) label With the extensive application of the physical entities such as sensor network nodes, how effective certification is implemented to these physical entities and be to ensure that system The key factor of safety.However, because this kind of entity generally existing computing capability is poor, resource-constrained the problems such as, tradition is based on close There is very big obstacle in application in the authentication method that code is learned.Use for reference currently widely used based on human body unique features fingerprint or rainbow The thought to personal enforcement certification for the film, there has been proposed uniquely identify single thing based on the inherent physique of physical entity Reason entity, realizes the method to the effective certification of physical entity.Here it is it has been proposed that physics unclonable function (Physical Unclonable Function, PUF) concept.More and more pay close attention to people, physics unclonable function is employed To more fields such as system authentication and key generation, and it is increasingly becoming a hot technology in hardware security field.
Physics unclonable function circuit be a kind of rely on chip features hardware function realize circuit, have uniqueness and Randomness, by extracting the technological parameter deviation necessarily introducing in chip manufacturing proces, realizes pumping signal with response signal only One corresponding function performance.Because same type of PUF circuit structure is identical, and after the completion of the manufacture of each PUF circuit Function performance determines and unique, therefore, another outstanding feature of PUF circuit is with nonclonability.PUF circuit above-mentioned Characteristic is so as to can be used for building safety chip, and defends various attacks.One physical entity is inputted with an excitation, utilizes The random difference of its inevitable inherent physique exports a uncertain response, and such a resistance against physical clone attacks The function hitting is as shown in Figure 1.Obviously, its topmost advantage be can resist physical clone attack generation, simultaneously with respect to For the physical entity of resource-constrained, its advantage also includes this exciter response behavior that can not be cloned and not only can realize Some functions as conventional public-key password, and calculating, storage and communication overhead can also be greatly reduced.
Identical excitation is applied for same chip, produces different responses because of the difference of external environment, this Being the unavoidable problem of PUF itself, absolute stablizing cannot being ensured because PUF generates response, if only changed up from structure It is apt to also be insufficient for the requirement to stability in practical application, typically also need to add fuzzy extraction algorithm in PUF, correct For the excitation of same chip identical, produce the problem of different responses because external environment is different, as shown in Figure 2.
The fuzzy extraction algorithm currently commonly used is BCH error correction algorithm.BCH code is the error correcting code that a class is commonly used, and it is initially Response message sequence be divided into message groups by one group fixing of k position, more each message groups individual transform is grown into n (n>k) Binary digit group, referred to as code word.The process that message groups are transformed into code word is referred to as encoding, and its inverse process is referred to as decoding.Entangle Wrong ability is the important indicator of BCH code, if having m position to occur in that mistake in initial response message k position, if m is less than or equal to The error correcting capability of BCH code design, then pass through BCH encoding and decoding algorithm, can complete the error correction of this m bit-errors position, otherwise it is impossible to entangle Lookup error.
The advantage of Bose-Chaudhuri Hocquenghem error correction codes is that have powerful error correcting capability, using BCH as fuzzy extraction algorithm, it is possible to achieve many The error correction of position, but Bose-Chaudhuri Hocquenghem error correction codes also have its shortcoming:Bose-Chaudhuri-Hocquenghem Code device and BCH decoder are required for consuming very many logic moneys Source, and need multiple clock cycle just can complete BCH encoding-decoding process, and the fuzzy extraction algorithm required for PUF is it is impossible to account for With excessive logical resource, and fuzzy extraction process to be completed within the comparatively short time, BCH error correction algorithm is in these areas Do not preponderate.
Content of the invention
The technical problem to be solved is to provide a kind of PUF and obscures extraction circuit and method, and it has stronger Error correcting capability, and the logical resource being consumed is seldom, and has the characteristics that Fast Fuzzy extracts.
The present invention solves described technical problem and employed technical scheme comprise that, PUF obscures and extracts circuit it is characterised in that wrapping Include following part:
Majority voting module, everybody of response data for producing to identical excitation carries out majority voting, with most tables Certainly as the output result of majority voting module, described response data is at least cubic response that identical driving source is produced to result Response data;
Hamming code coding module, for carrying out hamming code to the output result of majority voting module;
Correction module, in the initial phase that is stored with generate auxiliary Hamming code, for Hamming code coding module Output comparison to check its error message and to export final response;
The outfan of majority voting module connects the input of Hamming code coding module, the outfan of Hamming code coding module Connection error corrects the input of module.
The present invention also provides a kind of PUF to obscure extracting method it is characterised in that comprising the steps:
1) majority voting is carried out to each of at least cubic response signal data from same driving source, decided by vote Response signal afterwards;
2) hamming code process is carried out to the response signal after voting;
3) the auxiliary Hamming code that the response signal after hamming code and initial phase prestore is compared, judges whether Wrong, if wrong and wrong digit is more than 1, export authentication failed information;If not having mistake or wrong digit to be equal to 1, output is tested Card passes through information.
Described step 3) be:The auxiliary Hamming code that response signal after hamming code and initial phase are prestored carry out by Position XOR calculates, and judges whether wrong, if wrong and wrong digit is more than 1, exports authentication failed information;If there is no mistake or mistake Digit is equal to 1 by mistake, and output is verified information.
Present invention incorporates the advantage of majority voting device and Hamming code coding.Majority voting device itself extracts electricity as fuzzy Road is it is possible to reach the ability of very high exclusion external environmental interference, but in order to lift capacity of resisting disturbance further, the present invention adds Enter Hamming code coding module so that this obscures extracts the fuzzy extraction circuit performance that performance of circuit is realized with Bose-Chaudhuri Hocquenghem error correction codes Quite, and the logical resource quantity that consumed is a lot of less compared with the fuzzy extraction circuit that Bose-Chaudhuri Hocquenghem error correction codes are realized.This meets PUF's One significant design principle:Lightweight.PUF has lightweight attribute and refers to realize the number of the components and parts of physics unclonable function Amount and size are all very littles, and this has vast application prospect in the middle of the equipment of resource-constrained.In such as RFID, sensor network In the middle of the equipment of the resource-constraineds such as node, the logical resource leaving PUF for is little, so lightweight just becomes rigid wanting Ask.Present invention achieves lightweight high-performance obscures extracts circuit design, make great sense in the application of lightweight PUF.
Brief description
Fig. 1 is the exciter response schematic diagram of mechanism of physics unclonable function.
Fig. 2 is to add the fuzzy PUF system schematic extracted.
Fig. 3 is circuit module schematic diagram of the present invention.
Fig. 4 is the structural representation of majority voting device.
Fig. 5 is the structural representation of hamming code circuit.
Specific embodiment
The circuit of the present invention includes three parts, as shown in Figure 3:Majority voting device module, Hamming code coding module and mistake Correct module by mistake.The effect of majority voting device module is that the response that identical excitation is produced carries out majority voting, determines final Response what is.Hamming code coding module is that the response that majority voting device module is produced carries out Hamming code coding.Mistake is entangled The effect of positive module is to enter row operation using the Hamming code that Hamming code coding module produces with auxiliary Hamming code, obtains errors present Information, and carry out error correction.
The present invention supports the operation in two stages:Generation phase and authentication phase.(initialize in initial generation phase Stage), input one to PUF and encourage n time, produce n response, then with fuzzy extraction algorithm according to this n response generation one Individual auxiliary Hamming code, for the error correcting of authentication phase.In authentication phase, the response being produced according to excitation, extracted with fuzzy Algorithm produces a Hamming code, and the auxiliary Hamming code producing with generation phase does computing, according to operation result, response message is entered Row error correction, and produce final response message.
The input of majority voting device is the response message that PUF produces, and in the course of the work, applies n identical to PUF and swashs Encourage, then can produce n response, but this n response is because of the impact of external environment, and (such as supply voltage is unstable, temperature Change, impact of peripheral electromagnetic field etc.), and not quite identical, for a certain position of response message, be not 0 to be exactly 1, most The effect of voting machine be exactly on a certain position be relatively 0 appearance often or 1 occur often, if more than 0, finally many Number this outputs of voting machine be exactly 0, otherwise, majority voting device this be output as 1.Each input information position is corresponding many Number voting machine circuit is as shown in Figure 4.The quantity of depositor group is 2, and in a verification process, input information position has altogether and inputs 3 times, the information inputting each time is not 0 to be exactly 1, and depositor group is used for storing the accumulation result of these information bits, 3 input knots Shu Hou, carries out accumulation result and 2 comparison with comparator, if accumulation result is more than or equal to 2, final information bit is 1, no Then, final information bit is 0.
Register number required for summarizing, each information bit needs 2 depositors, is n position for response message Situation, needing altogether 2*n depositor, adder and comparator to have altogether needs 18 gates, so majority voting device has altogether Need 2*n depositor and 18*n gate.
On the clock cycle being consumed, for when response message is n position, will having processed this n position information, needs when The clock cycle is 3*n/8.
The effect of Hamming code coding module is that the information bit to the output of majority voting device carries out Hamming code coding.Hamming code is A kind of coded system that can correct bit-errors, if response message has 8, needs 6 Hamming codes can correct 1 in 8 Mistake, when response message digit is multiplied, the Hamming code of needs only need to increase by 2, for the response message of 512, needs 24 Hamming codes.During Hamming code coding some response message positions are done with xor operation, the result of xor operation constitutes final Output Hamming code.Physical circuit is as shown in Figure 5.In figure COUNTin is the data of 9bit, represents this information bit in whole response letter It is which position in breath, after the calculating of multiple clock cycle, the value in depositor is exactly final Hamming code coding result.The Chinese The principle system known technology of bright code correction, such as document:[beautiful] Rober t J.McEliece writes Li Dou Yin etc. and translates. theory of information With coding theory (second edition) [M]. Electronic Industry Press publishes.The present invention repeats no more its principle.
The logical resource that Hamming code coding module consumes is fewer, needs altogether 18 depositors, and 36 gates.Institute The clock cycle consuming is n.
Correction module is used for authentication phase, and the Hamming code that Hamming code coding module produces is the defeated of correction module Enter, in correction module, store the auxiliary Hamming code of generation phase generation simultaneously, this two Hamming codes do xor operation, root According to XOR result, judge whether the response message of authentication phase is wrong, if wrong, whether mistake digit is equal to 1, if with Upper two kinds of situations, then be verified, otherwise, authentication failed.
For the present invention, citing is described in detail to circuit workflow:Assume that response is 8bit signal, generating rank Section, encourages to PUF3 identical, produces 3 identical responses, response value is all 10110110, then after multichannel voting machine Value be also 10110110, this result inputs Hamming code generation module, and through xor operation, generating Hamming code is 100110, institute It is 100110 with the auxiliary Hamming code that generation phase produces;For authentication phase it is assumed that inputting 3 identical excitations to PUF, produce Raw response is 10010110,10010110,10110110 respectively, and after multichannel voting machine, the result obtaining is 10010110, different from the value of authentication phase gained, differ one, after Hamming code coding module, through xor operation, obtain To result be 000000.This Hamming code carries out XOR with auxiliary Hamming code 100110, and result is 100110, has 31, generation Table there occurs bit-errors, within the scope of error correction, can correct, so being verified.
The resource quantity that correction module is consumed is 46 gates, the clock cycle that correction module is consumed It is 2.
The logical resource sum that the present invention is consumed is:18*n+82 gate and 2*n+18 depositor, and one is same The logical resource quantity (34*n+110 gate and 8*n+28 depositor) that the BCH error correction circuit of sample function needs is much larger than Logical resource quantity required for circuit of the present invention.And the total clock cycle consuming is 11*n/8, due to majority voting device Pile line operation can be formed with Hamming code coding module, so the clock cycle consuming can be less, and the volume solution of BCH algorithm Code will carry out multiple steps:Syndrome calculates, error location polynomial calculates and three steps of chien search, and these three steps Suddenly it is serial, the clock cycle of consumption is 18*n, much larger than the clock cycle required for circuit of the present invention.So, the present invention More traditional BCH algorithm has faster speed, consumes less logical resource simultaneously.
Circuit of the present invention is the important component part of PUF, and PUF mainly has four kinds of applications:Certification, random oracle, can count Calculate function and key generator.
Certification is the most basic application of PUF.Due to attributes such as the unclonable, anti-tamper of PUF and lightweights, using PUF It is a kind of highly useful anti-counterfeiting technology for certification.So in the related application document of PUF, this is modal form. Its ultimate principle is:In registration phase, the identity of some CRP of each PUF physical system together with embedded PUF by It is stored in data base.In authentication phase, verifier selects a random CRP from data base, be provided to current be Unite and to encourage PUF, if it is observed that the response of PUF is sufficiently close to the response of storage in data base, then certification success, otherwise Failure.In order to prevent Replay Attack, each CRP of each PUF is used only once and must be from data after checking terminates Delete in storehouse.
Random oracle (Random Oracle) refers to that one deterministic public addressable is uniformly distributed letter at random Number, for the input of random length, in domain output, the value of one definitiveness length of uniform design is as the answer of inquiry.It is based on The method of PUF can be providing safety and secret protection.It to realize safety by using PUF as a random oracle Property, but without the whole attributes using random oracle model, then it may not be necessary to simulation PUF is random as one Prophesy machine.
Due to can be represented using linear inequality based on digital circuit PUF postponing, so it can be used to conduct One calculable functions.This means that server does not need to store CRP, but directly calculate estimated response.This allows for PUF has the advantage of lightweight, is more suitable for using in the equipment as resource-constraineds such as RFID, sensor network nodes.
It is used PUF mainly to consider to use digital circuit PUF as key generator.Because in integrated circuits, number Word circuit PUF has good attribute to generate for key and store.By using suitable post-processing technology, PUF can be used for giving birth to Produce encryption strong encryption keys so that scheme has more safety.

Claims (4)

1.PUF obscures and extracts circuit it is characterised in that including following part:
Majority voting module, everybody of response data for producing to identical excitation carries out majority voting, with majority voting knot As the output result of majority voting module, described response data is the sound at least cubic response that identical driving source produces to fruit Answer data;
Hamming code coding module, for carrying out hamming code to the output result of majority voting module;
Correction module, the auxiliary Hamming code generating in the initial phase that is stored with, for defeated with Hamming code coding module Go out comparison to check its error message and to export final response;
The outfan of majority voting module connects the input of Hamming code coding module, and the outfan of Hamming code coding module connects The input of correction module.
2.PUF obscures extracting method it is characterised in that comprising the steps:
1) majority voting is carried out to each of at least cubic response signal data from same driving source, after being decided by vote Response signal;
2) hamming code process is carried out to the response signal after voting;
3) the auxiliary Hamming code that the response signal after hamming code and initial phase prestore is compared, determines whether Mistake, if wrong and wrong digit is more than 1, exports authentication failed information;If not having mistake or wrong digit to be equal to 1, output checking By information.
3. PUF as claimed in claim 1 obscures extracting method it is characterised in that described step 3) be:After hamming code The auxiliary Hamming code that response signal and initial phase prestore carries out XOR by turn and calculates, and judges whether wrong, if wrong and wrong Digit is more than 1 by mistake, exports authentication failed information;If not having mistake or wrong digit to be equal to 1, output is verified information.
4. PUF as claimed in claim 1 obscures extracting method it is characterised in that described auxiliary Hamming code is in initial phase Produce, generation step is:Input one to PUF to encourage n time, produce n response, then with fuzzy extraction algorithm according to this n Response produces auxiliary Hamming code.
CN201610794033.7A 2016-08-31 2016-08-31 PUF is fuzzy to extract circuit and method Expired - Fee Related CN106385316B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610794033.7A CN106385316B (en) 2016-08-31 2016-08-31 PUF is fuzzy to extract circuit and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610794033.7A CN106385316B (en) 2016-08-31 2016-08-31 PUF is fuzzy to extract circuit and method

Publications (2)

Publication Number Publication Date
CN106385316A true CN106385316A (en) 2017-02-08
CN106385316B CN106385316B (en) 2019-03-05

Family

ID=57938266

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610794033.7A Expired - Fee Related CN106385316B (en) 2016-08-31 2016-08-31 PUF is fuzzy to extract circuit and method

Country Status (1)

Country Link
CN (1) CN106385316B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108632038A (en) * 2017-03-17 2018-10-09 株式会社东芝 Information processing unit
CN108875417A (en) * 2017-05-09 2018-11-23 中芯国际集成电路制造(上海)有限公司 The generation method of PUF characteristic value and device with PUF
CN109446846A (en) * 2018-10-19 2019-03-08 东南大学 A kind of physics unclonable function error correction method
CN109509495A (en) * 2017-09-14 2019-03-22 清华大学 The operating method and its operating device of resistance-variable storing device, chip and chip authentication method
CN110442889A (en) * 2018-05-03 2019-11-12 北京大学 A kind of circuit credibility design method based on PUF and Fuzzy Processing

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105007285A (en) * 2015-08-19 2015-10-28 南京万道电子技术有限公司 Key protection method and safety chip based on physical no-cloning function
CN105723651A (en) * 2013-11-10 2016-06-29 赛普利斯电子有限责任公司 Authenticatable device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105723651A (en) * 2013-11-10 2016-06-29 赛普利斯电子有限责任公司 Authenticatable device
CN105007285A (en) * 2015-08-19 2015-10-28 南京万道电子技术有限公司 Key protection method and safety chip based on physical no-cloning function

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
MAES R,ETC AL.,: ""Intrinsic PUFs from Flip-Flops on Reconfigurable Devices[C]"", 《PROCEEDINGS OF THE 3RD BENELUX WORKSHOP ON INFORMATION AND SYSTEM SECURITY (WISSEC)》 *
PATRICK KOEBERL,ETC AL.,: ""Entropy Loss in PUF-based Key Generation Schemes:The Repetition Code Pitfall"", 《2014 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108632038A (en) * 2017-03-17 2018-10-09 株式会社东芝 Information processing unit
CN108875417A (en) * 2017-05-09 2018-11-23 中芯国际集成电路制造(上海)有限公司 The generation method of PUF characteristic value and device with PUF
CN108875417B (en) * 2017-05-09 2020-05-08 中芯国际集成电路制造(上海)有限公司 Method for generating a PUF signature and device having a PUF
CN109509495A (en) * 2017-09-14 2019-03-22 清华大学 The operating method and its operating device of resistance-variable storing device, chip and chip authentication method
CN109509495B (en) * 2017-09-14 2020-09-22 清华大学 Operation method of resistive random access memory, operation device of resistive random access memory, chip and chip authentication method
CN110442889A (en) * 2018-05-03 2019-11-12 北京大学 A kind of circuit credibility design method based on PUF and Fuzzy Processing
CN110442889B (en) * 2018-05-03 2021-07-09 北京大学 Circuit credibility design method based on PUF and fuzzy processing
CN109446846A (en) * 2018-10-19 2019-03-08 东南大学 A kind of physics unclonable function error correction method
CN109446846B (en) * 2018-10-19 2023-01-31 东南大学 Physical unclonable function error correction method

Also Published As

Publication number Publication date
CN106385316B (en) 2019-03-05

Similar Documents

Publication Publication Date Title
CN106385316B (en) PUF is fuzzy to extract circuit and method
US11533188B2 (en) Multi-PUF authentication from sensors and their calibration
Paral et al. Reliable and efficient PUF-based key generation using pattern matching
Prada-Delgado et al. PUF-derived IoT identities in a zero-knowledge protocol for blockchain
KR101723006B1 (en) Device authentication using a physically unclonable functions based key generation system
CN106372539B (en) Frequency conversion ring oscillator PUF circuit and its control method
US20130147511A1 (en) Offline Device Authentication and Anti-Counterfeiting Using Physically Unclonable Functions
US10235517B2 (en) Robust device authentication
Dubrova et al. CRC-PUF: A machine learning attack resistant lightweight PUF construction
CN104168264B (en) A kind of low cost, high security physics unclonable function circuit
WO2009079050A2 (en) Authentication with physical unclonable functions
CN103020552B (en) PUF (Physical Unclonable Function) On-chip self enrollment system based on SRAM (Static Random Access Memories) of PUF and implementation method thereof
Vidanage et al. A graph matching attack on privacy-preserving record linkage
WO2013088939A1 (en) Identification information generation device and identification information generation method
US10885228B2 (en) Cryptographic ASIC with combined transformation and one-way functions
Nguyen et al. Efficient attacks on robust ring oscillator PUF with enhanced challenge-response set
Hemavathy et al. Arbiter PUF-a review of design, composition, and security aspects
Alimohammadi et al. Secure hardware key based on physically unclonable functions and artificial neural network
CN115242402B (en) Signature method, signature verification method and electronic equipment
Ganta et al. Easy-to-build arbiter physical unclonable function with enhanced challenge/response set
Kodýtek et al. Proposal and properties of ring oscillator-based PUF on FPGA
CN117081751A (en) High-reliability quantitative response arbiter type PUF structure
CN113507362B (en) RO PUF secret key generation method based on quadruple comparison strategy
Zerrouki et al. A low-cost authentication protocol using Arbiter-PUF
Gao et al. A challenge obfuscation method for thwarting model building attacks on PUFs

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190305

Termination date: 20190831