SRAM-PUF-based fuzzy safe box authentication method

A fuzzy safe, waiting for authentication technology, applied in the field of information security, can solve problems such as power-on value uncertainty, error, and authentication result error

Active Publication Date: 2017-07-11
SOUTHEAST UNIV
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Compared with biological characteristics, PUF circuits are also irreplaceable and unique. However, since SRAM-PUF (Static Random Access Memory Physical Unclonable Function) circuit units contain highly random units (oscillation points), these units The power-on value obtained b

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SRAM-PUF-based fuzzy safe box authentication method
  • SRAM-PUF-based fuzzy safe box authentication method
  • SRAM-PUF-based fuzzy safe box authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0065] figure 1 It is a general flowchart of the SRAM-PUF fuzzy safe authentication method, including two stages of registration and authentication. In the registration stage, the legal SRAM-PUF chip information is registered in a safe environment; in the authentication stage, the target SRAM-PUF chip is authenticated in the application environment.

[0066] The registration stage registers the SRAM chip according to the following steps:

[0067] The first step is to determine the registration parameters: determine the size of the SRAM chip and the number of bits of the SRAM chip address; determine the length of the registration key S; determine the polynomial f(x)...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses an SRAM-PUF-based fuzzy safe box authentication method. According to the method, during the registration phase, the feature data of SRAM-PUF are extracted and a secret key S is constructed. Meanwhile, the hash value of the secret key S is calculated. According to the feature data of SRAM-PUF and the secret key S, a fuzzy safe box V is generated for encryption. A corresponding authentication method is provided cooperatively, wherein the fuzzy safe box technology is introduced to the SRAM-PUF-based authentication system. According to the invention, the polynomial reconstruction and the error correction coding are conducted to generate the secret key S. based on the above manner, the reconstruction and authentication of the secret key can still be accurately realized with the presence of a certain error rate PUF. The ambiguity of the PUF and the accuracy of the secret key are organically combined, and an encryption authentication system having the error correction function is provided. As a result, the safety and the reliability in the authentication process are improved. Meanwhile, the method is easy to implement, and can resist various current mainstream attack modes to the fuzzy safe box.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an authentication method and authentication system based on SRAM-PUF. Background technique [0002] As an emerging information security mechanism, Physical Unclonable Functions (PUFs) realize functions such as security authentication and key storage by extracting uncontrollable and unclonable circuit differences generated during the manufacturing process of circuits. PUF-based security authentication technology is one of the important applications of PUF. To solve the reliability problem of PUF, the mainstream solution is fuzzy extraction through auxiliary data stored in non-volatile registers. The fuzzy extractor algorithm is a widely used authentication algorithm at present. In the registration stage, a random number R is first selected, and the value hash(R) of R after the general hash algorithm operation is stored. The fuzzy extraction algorithm performs an XOR...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0869H04L9/3278
Inventor 李冰陈帅杨超凡王凯
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products