Computer Science ›› 2016, Vol. 43 ›› Issue (Z11): 373-376.doi: 10.11896/j.issn.1002-137X.2016.11A.086

Previous Articles     Next Articles

Design Method of SRAM-PUF Based on Error Correcting Code Fuzzy Extractor

XU Tai-zhong, YANG Tian-chi, CHENG Juan and SHAO Qi-feng   

  • Online:2018-12-01 Published:2018-12-01

Abstract: Physical unclonable function is a new kind of hardware security technology.The physical fingerprint characteristics of the chip are used in many fields such as key generation and identity authentication.The fuzzy extractor based on error correcting code was proposed in this paper to improve the robustness of PUF of SRAM.The working process of fuzzy extractor can be divided into two stages,generation stage and reconfiguration stage.The supplementary data of PUF is created by using BCH encoder method in generation stage.And the stable response output of PUF is created by using supplementary data and the error correcting ability of BCH encoder in reconfiguration stage.The fuzzy extractor experiment is running on ATSAMV70J19 CPU platform and the consistency reaches 99.9% under different operating temperatures.The result of experiment verifies the excellent performance of this method.

Key words: Physical unclonable function,Fuzzy extractor,Error correcting code,Key generation,Identity authentication

[1] 胡丽辉,张建泉,李楠,等.带内存保护的FreeRTOS在TMS570上的移植[J].单片机与嵌入式系统应用,2015,5(2):63-66
[2] 李龙谱,斯雪明,张志鸿,等.在多FPGA上实现基于字典的ZIP文档口令恢复[J].计算机应用与软件,2015,32(6):292-295
[3] 李浪,李仁发,童元满,等.嵌入式加密芯片功耗分析攻击与防御研究进展[J].计算机研究与发展,2010,7(4):595-604
[4] Pappu R,Recht B,Taylor J,et al.Physical one-way functions[J].Science,2001,297(5589):2026-2030
[5] Devadas S,Suh E,et al.Design and implementation of PUF-based ‘unclonable’ RFID ICs for anti-counterfeiting and security applications[C]∥IEEE International Conference on RFID.2008:58-64
[6] Machida T,Yamamoto D,et al.A New Mode of Operation for Arbiter PUF to Improve Uniqueness on FPGA[J].Proceedings of the 2014 Federated Conference on Computer Science and Information Systems,2014,2(3):871-878
[7] Kumar S S,Guajardo J,et al.Extended abstract:the butterfly PUF protecting IP on every FPGA[C]∥IEEE International Workshop on Hardware Oriented Security and Trust.2008:67-70
[8] Tuyls P,et al.Read-proof hardware from protective coatings[C]∥8th International Workshop,Vokohama,Janpan.October 10-13,2006:369-383
[9] Cao Yuan,Zhang Le,et al.A low-power hybrid RO PUF with improved thermal stability for lightweight applications[J].IEEE Transactions on Computer-aided Design of Integrated Circuits and Systems,2015,34(7):1143-1147
[10] Masato T G C,Mitsuru S,et al.A stable key generation fromPUF responses with a fuzzy extractor for cryptographic authentications[C]∥IEEE Global Conference on Consumer Electro-nics.2013:525-527
[11] Guajardo J,Kumar S S,Schrijen G J,et al.FPGA Intrinsic PUFs and Their Use for IP Protection[M].Cryptographic Hardware and Embedded Systems-CHES 2007.Springer Berlin Heidelberg,2007:63-80
[12] 李晖,夏伟,邓冠阳,等.PUF-HB#:轻量级RFID双向认证协议[J].北京邮电大学学报,2013,36(6):13-17
[13] Majzoobi M,Rostami M,et al.Devadsa S.Slender PUF protocol:A light weight,robust,and secure authentication by substring matching[J].IEEE Symposium on Security and Privacy Workshops,2012:33-44
[14] 向学哲,马昌社.基于PPUF的高效RFID隐私认证协议[J].华南师范大学学报,2013,45(1):42-46
[15] Canteaut A,Chaband F.A New Algorithm for Finding Mini-mun-weight Words in a Linear Code:Application to McEliece’s Cryptosystem and to BCH codes of length 511[J].IEEE Tran-sactions on Information Theory,2010,44(1):367-378
[16] Hori Y,Yoshida T,et al.Quantitative and Statistical Perfor-mance Evaluation of Arbiter Physical Unclonable Functions on FPGAs[C]∥2010 International Conference on Reconfigurable Computing and FPGAS,Cancun,Quintana Roo,Mexico,13-15 December 2010:115-120

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!