Soft puf based on camellia encryption algorithm

An encryption algorithm and ciphertext technology, applied in computing, computer security devices, and key distribution, can solve the problems of low uniqueness and randomness of microprocessor PUF, low difficulty in cracking microprocessor PUF, unfavorable chip authentication, etc., and achieve Avoid instability, good uniqueness and randomness, and high security effects

Active Publication Date: 2022-06-21
WENZHOU UNIVERSITY
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

According to the coding rules, each sampling point can only generate a 2-bit response. Due to the small number of response bits, the difficulty of cracking the PUF of the microprocessor is relatively low, and it is not conducive to chip authentication.
According to the experimental results, the uniqueness and randomness of the microprocessor PUF are also low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Soft puf based on camellia encryption algorithm
  • Soft puf based on camellia encryption algorithm
  • Soft puf based on camellia encryption algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0032] Embodiment: A soft PUF based on Camellia encryption algorithm, including a hardware platform, the hardware platform is a 128-bit Camellia encryption algorithm hardware circuit, and the 128-bit Camellia encryption algorithm hardware circuit has the following ports: used for inputting a 128-bit key signal K 1 (128-bit binary data) 128-bit key input port key_in[0]-[127], used to input 128-bit plaintext signal P 1(128-bit binary data) 128-bit plaintext input port data_in[0]-[127], clock input port clk, 128-bit ciphertext output port data_out[0]-[127]; 128-bit Camellia encryption algorithm hardware circuit 128-bit subkey k is pre-stored in 1 , 128-bit subkey k 2 and timing path information, 128-bit subkey k 1 and 128-bit subkey k 2 They are 128-bit binary data, and 128-bit subkey k 1 and 128-bit subkey k 2 different from each other, timing path information including critical path delay T path and 128 timing paths directly related to the 128-bit ciphertext output port d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a soft PUF based on the Camellia encryption algorithm, including a hardware platform, the hardware platform is a 128-bit Camellia encryption algorithm hardware circuit, and the PUF response data is obtained by using the path delay deviation in the hardware circuit based on the Camellia encryption algorithm, without special hardware overhead , and the PUF response is collected at a fixed clock frequency, which avoids the instability caused by the frequency change process. In addition, the PUF response undergoes multiple rounds of data randomization of the Camellia encryption algorithm, which has high uniqueness and randomness. Extracting the PUF response from the output of the encryption algorithm hardware circuit is less difficult to acquire and has more digits, which is more secure; the advantage is that it has the ability to resist frequency disturbance, high reliability, good uniqueness and randomness, and high security , which is conducive to the application in the field of information security.

Description

technical field [0001] The invention relates to a soft PUF, in particular to a soft PUF based on the Camellia encryption algorithm. Background technique [0002] With the advent of the Internet of Things (IoT) era, how to ensure secure communication between devices becomes the key. Traditional security measures store keys in non-volatile memory (NVM), but they are extremely vulnerable to layout reverse engineering, microprobing and other attacks resulting in key leakage. Physical Unclonable Function (PUF) utilizes random process deviations in the manufacturing process of integrated circuits to generate high-security keys that can resist various physical attacks, and can be widely used in equipment anti-counterfeiting, user authentication, and integrated circuit intellectual property ( Intellectual Property, IP) nuclear protection and other occasions. [0003] The traditional PUF circuit relies on a special hardware structure to generate the required PUF response, and is us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/72H04L9/08
CPCG06F21/602G06F21/72H04L9/0861
Inventor 汪鹏君陈佳李方强李刚张会红
Owner WENZHOU UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products