Secret key extraction method and system based on SRAM PUF

A key extraction and key generation technology, applied in the field of information security, can solve the problem of occupying a lot of resources, achieve the effect of reducing error rate and improving system efficiency

Inactive Publication Date: 2016-04-27
DATA ASSURANCE & COMM SECURITY CENT CHINESE ACADEMY OF SCI
View PDF4 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing PUF-based key generator scheme solves the problem of PUF error rate at the cost of the complexity of the algorithm and the growth of auxiliary data storage space, which takes up more resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key extraction method and system based on SRAM PUF
  • Secret key extraction method and system based on SRAM PUF

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the purpose, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0037] The present invention provides a method for extracting a key based on a static random access memory PUF, including a registration stage and a verification stage:

[0038] The registration stage is as figure 1 shown, including:

[0039] Step 1: Power on the SRAMPUF, read and store the original data generated by the fixed address segment of the SRAM, and use the original data as the benchmark response data;

[0040] Step 2: Power on the SRAMPUF again, read the original data of the same fixed address segment of the SRAM as in step 1, compare it with the reference response data as the first initial value, obtain stable data, and obtain the address information that generates stable data as Stable data location information and store;

[0041] St...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secret key extraction method and a secret key extraction system based on an SRAM PUF. The secret key extraction method comprises a registration phase and an authentication phase. The registration phase comprises the steps of: reading original data generated by an SRAM fixed address field, and regarding the original data as an initial value; carrying out powering-on for many times, comparing the plurality of obtained initial values, and eliminating addresses corresponding to error-prone data bits in the initial values to obtain a stable address; and using an initial values generated by the stable address as a secret key material for generating a secret key, and generating an error correction code of the secret key material by adopting an error correction algorithm. Thus, the error rate of an SRAM address field for generating the secret key material is reduced, the system can select the simple error correction algorithm for carrying out error correction on the short original data when extracting the secret key material the next time, and the system efficiency is improved. The authentication phase comprises the steps of: extracting the original data with low error rate from the stable address obtained in the registration phase, carrying out error correction by adopting the same error correction algorithm, and finally recovering the secret key material.

Description

technical field [0001] The invention relates to the field of information security, in particular to a SRAM (Static Random Access Memory) PUF-based key extraction method and system. Background technique [0002] In recent years, with the widespread application of smart cards, radio frequency identification (Radio Frequency Identification, RFID) and other physical entities, how to effectively authenticate these physical entities has become a fundamental issue to ensure system security. However, because such entities generally have problems such as poor computing power and limited resources, there are great obstacles in the application of traditional cryptography-based authentication methods. Drawing on the idea of ​​authenticating individuals based on the unique characteristics of the human body (fingerprint or iris) currently commonly used, people based on the internal physical structure of physical entities to uniquely identify a single physical entity to achieve effective a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 刘宗斌章庆隆韩晔向继高能马原
Owner DATA ASSURANCE & COMM SECURITY CENT CHINESE ACADEMY OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products