【24h】

Extracting secret keys from integrated circuits

机译:从集成电路中提取密钥

获取原文
获取原文并翻译 | 示例

摘要

Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract secret keys from conditional access systems such as smartcards and ATMs. Arbiter-based physical unclonable functions (PUFs) exploit the statistical delay variation of wires and transistors across integrated circuits (ICs) in manufacturing processes to build unclonable secret keys. We fabricated arbiter-based PUFs in custom silicon and investigated the identification capability, reliability, and security of this scheme. Experimental results and theoretical studies show that a sufficient amount of inter-chip variation exists to enable each IC to be identified securely and reliably over a practical range of environmental variations such as temperature and power supply voltage. We show that arbiter-based PUFs are realizable and well suited to build, for example, key-cards that need to be resistant to physical attacks.
机译:现代密码协议基于这样的前提,即只有授权的参与者才能获得秘密密钥并访问信息系统。然而,已经设计出各种篡改方法以从诸如智能卡和ATM的条件访问系统中提取秘密密钥。基于仲裁器的物理不可克隆功能(PUF)利用制造过程中跨集成电路(IC)的导线和晶体管的统计延迟变化来构建不可克隆的秘密密钥。我们在定制硅片中制造了基于仲裁器的PUF,并研究了该方案的识别能力,可靠性和安全性。实验结果和理论研究表明,存在足够数量的芯片间变化,从而能够在环境变化(例如温度和电源电压)的实际范围内安全可靠地识别每个IC。我们证明了基于仲裁器的PUF是可实现的,并且非常适合构建例如需要抵抗物理攻击的钥匙卡。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号