期刊文献+

基于Xilinx Virtex-7系列FPGA器件配置存储空间PUF可行性探索

Exploration of the Feasibility of PUF Based on the Configuration Memory Space of Xilinx Virtex-7 Series FPGA Devices
下载PDF
导出
摘要 在静态随机存取存储器(SRAM)型现场可编程门阵列(FPGA)电路中,当电源启动并进行初始化时,SRAM单元通常会经历一个全面复位的过程。复位过程会导致SRAM单元内部的电荷分布形成一种特有的模式。提出了一种新的方法,利用配置内存中尚未使用的部分来识别电路,对8个Xilinx Virtex-7 FPGA进行总计200 000次的测量,评估了这种方法在同一电路中的一致性和在不同电路之间的差异性,以及随温度变化时和随时间老化后的稳定性。研究结果显示,SRAM物理不可克隆函数(PUF)能够有效地区分不同的FPGA电路。 In static random access memory(SRAM)-type field programmable gate array(FPGA)circuits,when the power supply is started and initialized,the SRAM cell usually undergoes a full reset process.The reset process results in a characteristic pattern of charge distribution within the SRAM cell.A new method is proposed to identify circuits using unused portions of configuration memory.A total of 200000 measurements are performed on 8 Xilinx Virtex-7 FPGAs to evaluate the consistency of this method within the same circuit and the differences between different circuits,as well as its stability with temperature changes and aging over time.The research results show that SRAM physically unclonable function(PUF)can effectively distinguish different FPGA circuits.
作者 郭俊杰 王婧 谢达 GUO Junjie;WANG Jing;XIE Da(Wuxi Esiontech Co.,Ltd.,Wuxi 214072,China)
出处 《电子与封装》 2024年第9期71-79,共9页 Electronics & Packaging
关键词 SRAM PUF FPGA 配置内存空间 SRAM PUF FPGA configuration memory space
  • 相关文献

参考文献9

二级参考文献86

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 3Gassend B, Clapke D. Silicon Physical Random Functions[C]//Proc. of the 9th ACM Conf. on CCS. Washington D. C., USA: [s. n.], 2002. 被引量:1
  • 4Pappu R, Recht B, Taylor J, et al. Physical One-way Functions[J]. Science, 2002, 297(5589): 2026-2030. 被引量:1
  • 5Lim D, Lee J W. Extracting Secret Keys from Integrated Circuits[J]. IEEE Transactions on VLSI Systems, 2005, 13(10): 1200-1205. 被引量:1
  • 6Wakerly J F. Digital Design Principles and Practices[M]. [S. l.]: Prentice Hall, 2006. 被引量:1
  • 7Juels A,Weis S A.Authenticating Pervasive Devices with Human Protocols[J].Advances in Cryptology,2005,6(3):293-308. 被引量:1
  • 8Feldhofer M,Recberger C.A Case Against Currently Used Hash Functions in RFID Protocols[C]//Proc.of Workshop on RFID Security.Montpellier,France:[s.n.],2006:372-381. 被引量:1
  • 9Tan C C,Sheng Bo,Li Qun.Serverless Search and Authentication Protocols for RFID[EB/OL].(2007-03-12).http://www.cs.wm.edu/ -cct/pub/percom07.pdf. 被引量:1
  • 10Suh G E,Devadas D.Physical Unclonable Functions for Device Authentication and Secret Key Generation[C]//Proc.of Design Automation Conference.San Diego,California,USA:[s.n.],2007:9-14. 被引量:1

共引文献60

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部