期刊文献+

基于信号传输理论的Glitch物理不可克隆函数电路设计 被引量:5

Design of Glitch Physical Unclonable Functions Circuit Based on Signal Transmission Theory
下载PDF
导出
摘要 通过对信号传输理论、竞争-冒险现象和物理不可克隆函数(Physical Unclonable Functions,PUF)电路的研究,论文提出一种基于信号传输理论的"毛刺"型物理不可克隆函数电路(Glitch Physical Unclonable Functions,Glitch-PUF)方案。该方案首先根据偏差延迟的信号传输理论,推导出获得稳定"毛刺"输出的电路级数;然后利用组合逻辑电路的传播延迟差异,结合"1"冒险和"0"冒险获得具有"毛刺"的输出波形,采用多级延迟采样电路实现Glitch-PUF的输出响应。由于"毛刺"信号具有显著的非线性特性,将其应用于PUF电路可有效解决模型攻击等问题。最后在TSMC 65 nm CMOS工艺下,设计128位数据输出的电路结构,Monte Carlo仿真结果表明Glitch-PUF电路具有良好的随机性。 In this paper, a Glitch-PUF circuit technique is proposed by taking into consideration various aspects i.e. the signal transmission theory, race and hazard phenomenon, and Physical Unclonable ~nctions (PUF). First and foremost, the glitch circuit is obtained under the signal transmission theory. Using the combinational logic circuit propagation delay difference which causes 1-hazard and 0-hazard, this feature is used to form output glitch waveform. This glitch is sampled by multistage delay sampling circuit. Due to the nonlinear characteristics of the Glitch, Glitch-PUF can thwart the modeling attack. Finally, under the TSMC 65 nm CMOS technology, a 128-bit output data Glitch-PUF circuit is designed. Monte Carlo simulation results show that the Glitch PUF circuit has better randomness.
出处 《电子与信息学报》 EI CSCD 北大核心 2016年第9期2391-2396,共6页 Journal of Electronics & Information Technology
基金 浙江省自然科学基金(LQ14F040001) 国家自然科学基金(61404076 61474068 61274132) 浙江省科技厅公益技术应用研究(2015C31010)~~
关键词 信息安全 物理不可克隆函数电路 信号传输理论 Glitch型物理不可克隆函数 Information security Physical Unclonable Functions (PUF) circuit Signal transmission theory Glitch-PUF
  • 相关文献

参考文献1

二级参考文献10

  • 1Gassend B, Clarke D, Van Dijk M, et al.. Silicon physicalrandom functions[C]. Proceedings of the 9th ACMConference on Computer and Communications Security, NewYork, NY, USA, 2002: 148-160. 被引量:1
  • 2Lim Daihyun, Lee J W, Gassend B, et al.. Extracting secretkeys from integrated circuits[J]. IEEE Transactions on VeryLarge Scale Integration (VLSI) Systems, 2005, 13(10):1200-1205. 被引量:1
  • 3Suh G E and Devadas S. Physical unclonable functions fordevice authentication[C]. Proceedings of the 44th AnnualDesign Automation Conference, New York, NY, USA, 2007:9-14. 被引量:1
  • 4Anderson Jason H. A PUF design for secure FPGA-basedembedded systems[C]. Proceedings of the 2010 Asia andSouth Pacific Design Automation Conference, IEEE PressPiscataway, NJ, USA, 2010: 1-6. 被引量:1
  • 5Li Xiao-xun, Gao Zhi-qiang, and Bai Guo-qiang. Design andFPGA implementation of secure key management[J]. LectureNotes in Engineering and Computer Science, 2011, 2189(1):1049-1054. 被引量:1
  • 6U????hrmair U R, Sehnke F, O???? lter J S, et al.. Modelingattacks on physical unclonable functions[C]. Proceedings ofthe 17th ACM Conference on Computer andCommunications Security, New York, NY, USA, 2010:237-249. 被引量:1
  • 7Dillard R A. Detectability of spread-spectrum signals[J].IEEE Transactions on Aerospace and Electronic Systems.1979, AES-15(4): 526-537. 被引量:1
  • 8Maiti A and Schaumont P. Improving the quality of aphysical unclonable function using configurable ringoscillators[C]. International Conference on FieldProgrammable Logic and Applications, FPL 2009, USA, 2009:703-707. 被引量:1
  • 9Merli D and Eckert C. Improving the quality of ring oscillatorPUFs on FPGAs[C]. Proceedings of the 5th Workshop onEmbedded Systems Security, New York, NY, USA, 2010:Article No. 9. 被引量:1
  • 10Maiti A, Nagesh R, Reddy A, et al.. Physical unclonablefunction and true random number generator: a compact andscalable implementation[C]. Proceedings of the 19th ACMGreat Lakes Symposium on VLSI, New York, NY, USA, 2009:425-428. 被引量:1

共引文献3

同被引文献25

引证文献5

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部