This invention relates to combination of values generated by one or more pseudo-random sources (PRS).
A pseudo-random value, or set of values, can be used, for example, for a applications in which the pseudo-random value can be regenerated, but the value cannot be predicted, or such prediction would be very difficult or time consuming. In some examples, the pseudo-random value depends on an input value, often referred to as a “challenge” value. In some examples, the pseudo-random values comprise bits that are generated by circuitry that implements a function depend on device-specific characteristics, for example, based on device-to-device fabrication variation among a set of devices that are fabricated in a common manner, for example, according to the same semiconductor masks and fabrication conditions. Some examples of such functions have been referred to as Physical Unclonable Functions (PUFs). Examples of the device-specific characteristics include time-delay along electrical signal paths (e.g., through logic gates and conductive traces), and voltage thresholds of active semiconductor devices. In a number of previous approaches, the device specific quantities are binary, for example, based on a comparison of pairs of underlying device-specific characteristics. For example, US Pat. Pub. 2003/0204743A1, titled “Authentication of Integrated Circuits,” describes an approach in which a device-specific bit is generated according to the relative delay along two delay paths. As another example, US Pat. Pub. 2007/0250938A1, titled “Signal Generator Based Device Security,” describes an approach in oscillation frequencies are compared to determine device-specific bits.
Statistical properties of the generated pseudo-random values can affect their suitability for certain applications. For instance, statistical bias of the values may affect the strength of authentication and/or cryptographic techniques that make use of the values. Measures of a set of values include the National Institute of Standards and Technology (NIST) Statistical Test Suite for Randomness, which includes tests that measure statistical bias.
In one aspect, in general, values generated by at least one pseudo-random source (PRS) are combined to form one or more combined values. The method involves using analog, digital, or hybrid manipulation techniques to transform characteristics of PRS, including but not limited to statistical characteristics, and input/output characteristics. In some examples, the recombination method provides a way to de-bias output bits from PRS without appreciable increase in self noise. In some examples, the recombined result passes NIST's Statistical Tests for Randomness even if underlying PRS natively does not. In some examples, the recombination method provides a way to make a PRS challengeable, even if the underlying PRS is not natively challengeable.
In another aspect, in general, values generated by a pseudo-random source (PRS) are combined to form one or more combined values. In some examples, the recombination depends on a challenge value. In some examples, the recombined values are applied to security applications, for instance authentication and/or cryptographic functions, which may provide improved characteristics (e.g., cryptographic strength) in view of a de-biased output that in some examples also passes NIST's Statistical Tests for Randomness.
In some examples, the PRS depends of one or more of biometric readings, measurements of physical characteristics such as paint splotch patterns, speckle patterns, optical or magnetic readings, piece of paper or fabric, device-specific signatures from an integrated circuit, each of which can be modeled as a direct, or possibly noisy, observation of a pseudo-random source.
In some examples, the PRS outputs real values in the sense that the output is more than a single hard bit (polarity). In some examples, the PRS may output values that are only a single bit and (optionally) multiple reading are taken to synthesize a “real” value. In some examples, other means can be used to synthesize “real” values from a PRS whose output values are a single bit. The real value may take the form of confidence/magnitude information
Values generated may be recombined using digital and/or analog techniques to produce certain desired properties in the system.
In some examples, the recombination approach may include making system fully challengeable, for instance, to generate multiple signatures through PRS recombination or reuse, thus reducing size of total PRS present, and making output of system be a real-valued output containing both polarity and confidence information. In some examples, only a single signature or key is required, and recombination can be used to reduce total PRS area by applying fixed challenge schedule to a recombination function that operates on an PRS area that would otherwise need to be larger (to generate the same size signature of key) if recombination were not applied.
In some examples, the recombination function and the PRS result in output bits that are unbiased by construction and pass NIST's Statistical Test Suite for Randomness. The recombination function, or in some cases more than one recombination function, can operate on an entire PRS at once (entire PRS treated as a single region), or operate on a region of PRS, with each region (possibly overlapping) using same or different recombination functions. The recombination output of each region can be also real valued (or hard binary value) and mixed with operations from different regions.
In various examples, challenge values are fixed, or non-fixed, and can determine parameters of each of recombination function, which recombination functions are used, and whether results are recombined again (possibly many times) before final real-valued output.
Recombination functions can be linear or non-linear. In some examples, the recombination approach offers a method to de-bias physical pseudo-random outputs that occur in nature without appreciable increase in self noise, which affects ability of authenticate or to error correct repeat readings into bit-exact values.
In some examples, the PRS forms an “entropy pool” with individual PRS components that are recombined with various functions, based on a challenge input, producing real-valued output whose bit polarity can be made random based on standard (NIST) tests. Entropy pool (PRS) and processing engine can be located in same entity (e.g., the same device) or in different entities.
In another aspect, in general, a device includes an input for accepting a challenge value. The device also includes a pseudo-random source configurable to provide a repeatably measurable characteristics, and includes a recombination module coupled to the input for accepting the challenge and to the pseudo-random source and responsive to the value. This module is for recombining the measurements according to a recombination function to form a recombined value. The device also has an output for providing the recombined value.
Aspect may include one or more of the following features.
The pseudo-random source is configured to provide multiple-bit representations of the measurable characteristics.
The recombination module is configured to form successive combined values, each recombined value being formed according to recombined result from PRS, using a different instantaneous challenge value. In a simple example, entire PRS is treated as a single region and one recombination function is used. In other example, a single recombination function can operate on multiple PRS and recombine values from multiple PRS, using, for example, outputs from multiple PRS to produce a single recombined output value, and using different instantaneous challenge values to produce successive recombined output values. In another example, multiple recombination function (possibly orthogonal functions) can operate on a single PRS, treated as a single region.
In another example, multiple recombination function can each be assigned to a region in PRS, with regions disjoint or possibly partially or fully overlapping. In another example, multiple recombination function can operate on multiple PRS.
The input for accepting the challenge includes a sequence generator that accepts the (initial) challenge accepted at the input and deterministically generates a sequence of (instantaneous) challenge values. The recombination module is responsive to successive (instantaneous) challenge values in forming the successive recombined values. In some examples, the sequence generator comprises a linear feedback shift register.
The corresponding subsets for successive combined values are selected from disjoint pools of the measurable characteristics.
The recombination function is selected to provide statistically unbiased recombined values.
The pseudo-random source comprises a measurement module for measuring the measurable characteristics.
The device further includes an authentication component responsive to the recombined value, a cryptographic component responsive to the recombined value for generating a secret value, and/or an error correction module for determining and/or using error correction data for the recombined value.
In another aspect, in general, device-specific quantities are generated in a circuit to depend on device-specific characteristics such that the quantity is represented by more than a single bit, with the quantity representing a degree of comparison of devices-specific characteristics. In some examples, the degree of comparison corresponds to a probability of that a bit will be reproduced in subsequent re-generation of the quantities. In some examples, the degree corresponds to a measure of a difference or differences between measured device-specific characteristics.
In another aspect, in general, a number of separate device-specific quantities are recombined, for example, according to a challenge input that determines which and/or in what manner the quantities are recombined. The resulting quantity maintains its device-specific nature, and can be more difficult to predict (e.g., in a cloned device), for instance, through use of a large number of potential challenge inputs. In some examples, the recombination is performed using operations on binary (e.g., two's complement) numbers, for instance, using additive and subtractive operations.
Aspects may include one or more of the following features.
The quantities are generated according to a challenge, for example, according to a 64-bit challenge value.
Quantities represent a polarity and a degree of confidence of the quantity.
The circuit (or a portion of the circuit or device) is implemented in a Field Programmable Gate Array (FPGA) or in an Application Specific Integrated Circuit (ASIC). In some examples, the pseudo-random source may be implemented in a different manner than the recombination circuit, for example, with the pseudo-random source using dedicated circuitry and the recombination circuit using configurable gate arrays, analog techniques, or an instruction processor.
In another aspect, in general, recombination provides a way to make PRS output real valued bits, even if underlying PRS natively does not.
In another aspect, in general, the recombination methods provides a way to recombine results from multiple PRS. In some examples, recombination is used to extract multidimensional output or multiple outputs (not necessarily orthogonal to each other) from a single PRS, or in some examples multiple PRS. In some examples, recombination function is selected to increase effort required to model physical random source from observations of bit output of recombination function. In some examples, recombined values are applied to security applications, for instance authentication and/or cryptographic functions, which may provide improved characteristics (e.g., cryptographic strength from debiased out; challengeability to address replay attacks; real valued output for reduced error correction complexity, etc.).
In another aspect, a recombination method provides a means to de-bias output bits (specifically the “polarity” portion of PRS output value when value in multi-bit) from PRS without appreciable increase in self noise. In certain examples, recombined result passes NIST's Statistical Tests for Randomness even if underlying PRS natively does not.
In another aspect, a recombination method provides a way to make a PRS challengeable, even if underlying PRS is not natively challengeable. Challengeability allows extraction of more signature/keys without larger instance of PRS (more ring oscillators, larger paint splotch area). Alternatively, a single key or signature can be generated with a smaller instance of PRS using a fixed challenge schedule. In certain examples, challengeability is accomplished in such a way that recombined output bits passes NIST's Statistical Tests for Randomness, even if underlying PRS natively does not.
In another aspect, the recombination method provides a way to make a pseudo-random system, possibly noisy, that is both challengeable and whose outputs are real-valued (contains both polarity and confidence information). The generation of real-valued bits provides a means to reduce error correction code complexity. In certain examples, error correction code complexity can be reduced exponentially, due to availability of confidence information from recombined output to perform a form of “soft decision” error correction code decoding. In some examples, recombination operation itself serves as an error reduction mechanism. In certain examples, output bit (polarity) generated from recombined result passes NIST's Statistical Tests for Randomness, even if underlying PRS natively does not, even if underlying PRS is not natively challengeable.
In another aspect, recombination method provides a means to combine results from different forms of PRS (silicon-based PUF with biometric readings), for use, for example, in a multi-modal signature/key system.
Aspects may include on or more of the following advantages.
The polarities of a series of output values are unbiased without an appreciable increase in self-noise (does not appreciably increase ECC complexity or increase type 1/type 2 authentication errors). For at least some recombination functions and pseudo-random sources, a bitstream formed from the polarities can pass the National Institute of Standards and Technology (NIST) Statistical Test for Randomness Suite, resulting in more entropy per outputted bit.
In some examples, recombined output exhibit better error characteristics than the native PRS output. For example, for some additive recombination functions, borderline outputs (noisy 1s and 0s) contribute less to the recombined result than strong 1s and 0s, thus allowing recombined output to have better error characteristics. This reduces error correction requirements, and increases strength (reduced type 1/type 2 errors) of authentication systems where error correction is not used.
Some examples provide an advantage of forming a PRS that is challengeable (eliminating a linear increase in PRS area for multiple signatures/keys, or alternatively reducing PRS implementation area required to produce a single signature or key), and that outputs bias-neutral bits (thereby making it more difficult for an adversary to apply a brute-force attack for a particular signature/key), and in particular achieving the latter without increasing self-noise appreciably.
Examples of recombination methods allows the PRS, even a naturally biased PRS, to be effectively un-biased (as measured by NIST tests) by (logical/algorithmic) construction, making method highly applicable to Field Programmable Gate Array (FPGA) and standard cell ASIC or other technologies where custom-layout or other customization facilities are limited. For instance, the recombination method reduces PRS silicon area required to withstand replay attacks (more signatures/keys without linear increase in size of PRS circuit through use of challenge).
In another aspect, a recombination method reduces PRS silicon area for single key/single root master system through use of, for example, fixed challenge schedule. In another aspect, the recombination method reduces (in certain examples exponentially) error correction code complexity/silicon area due to availability of real-valued outputs that indicate confidence of 1s and 0s (polarity), as well as error reduction effects of certain classes of recombination functions, or combinations thereof.
Other features and advantages of the invention are apparent from the following description, and from the claims.
Referring to
In general, the R-PUF makes use of the pseudo-random source (PRS) 110, which is a physical and/or logical element that can generate set (e.g., an indexed set, for instance, indexed by a place or time) of pseudo-random quantities r0, . . . , rn-1, each possibly including a degree of “noise,” for instance with a degree of additive random noise. That is the PRS can be considered as being capable of repeatedly regenerating the indexed set r0, . . . , rn-1 to within a degree of similarly related to the “noise” in the values.
In some embodiments, the PRS 110 generates the values in a manner that is specific to a device in which it is implemented in the sense that it is impossible or very difficult to duplicate (e.g., “clone”) its function in another device. For instance, a circuit implementing the PRS generates the values in a manner that depends on fabrication characteristics that vary among instances of the circuit, for example, among instances fabricated in the same manner or instances hosted in the same type of programmable gate array. In some examples, each pseudo-random value is represented as a two's complement number. That is, the j-bit output represents an integer in the range −2j-1, . . . , +2j-1−1.
The R-PUF 100 effectively generates one or more random numbers, Ri, which depends on the challenge input and on the output of the PRS 110. In the embodiment shown in
In examples in which the recombiner and the PRS are implemented in the same device, one or more outputs of an R-RUF may be used to authenticate a device in which the PRS is implemented, to encrypt information passed to or from the device, or perform security functions that benefit from the unclonable and/or unpredictable nature of the R-PUF. In examples where recombiner and PRS are physically distinct, one or more outputs of an R-RUF may be used to authenticate a particular instance of PRS external to device containing recombiner, or to generate keys associated with PRS being joined to device containing recombiner; a R-PUF is logically formed when the recombiner is joined with in instance of PRS external to device containing recombiner.
Referring to
In some embodiments, each PRS output represents a probability (which may be referred to as a “soft bit”) of the sign of an underlying quantity upon repeated generation. For example, if the relative delay of two delay lines are very different, the output will be (as an example) close to 2j-1−1 or close to −2j-1, and if the two delay lines are very similar, then the output will be close to 0.
In some embodiments, the PRS itself may be challengeable. Since the recombiner expects the pseudo-random sequence r0, . . . , rn-1 to be reproduced whenever a particular instantaneous challenge applied to recombiner, the PRS challenge may be fixed (i.e., the same for all challenge inputs to the R-PUF) or may be dependent on the R-PUF challenge input.
Referring to
In this example, the recombination function element 124 accepts the N-bit challenge input, which controls a series inputs to multipliers 222, to multiply each corresponding PRS input by either +1 or −1 selected using a multiplexor 220 according to the value of a corresponding bit of the input challenge. In some alternative implementations, this multiplication is implemented with bit-wise inverters and multiplexors as an optimization, instead of using an explicit multiplier and a multiplexor to one of the multiplier input, or using various other transformations or optimizations. The outputs of the multipliers 222 are passed to a summer 224 which accumulates the multiplied PRS values to generate the signed multi-bit (e.g., 2's complement) value R, which represents both a polarity and magnitude/confidence information. In applications where confidence information is not required, just the “hard” bits (bit polarity) is outputted as a single-bit value. A specific example of the arrangement shown in
Referring to
Referring to
The example of a combination block 420 effectively computes a difference of the two input values according to the corresponding challenge bits. Specifically, the combination block 420 provides an output
where the challenge bits ci represent the tuple (x, y, p), where the values x and y control the selectors 426 and the value p controls the selector 428. Note that to the extent that the input values have the same expected value, the output of the combination block is unbiased. The outputs of each of the combination blocks 430 are then summed in the overall combination block 430 to form the overall output
In alternative embodiments, rather than using device-specific circuit characteristics, such as characteristics of oscillators, the PRS output quantities that are recombined according to a challenge are based on other types of internal or external measurements of underlying physical characteristics.
The underlying physical characteristics may be, for instance, biometric or manufactured characteristics of a user or device that is to be authenticated. An example of manufacturing characteristics (e.g., a paint speckle pattern) on a casing of telecommunications equipment with a rough surface that is produced as a result of manufacturing process.
Referring to
An example of such a scanner 520 is able to locate a reference location (inherent in manufacturing of material) to align the scan, and post process as necessary before outputting. A gain control and/or normalizer stage 530 processes the output of the scanner 520. For example, bias associated with surface height being above or below certain level is de-baised (perhaps on a scan region by scan region basis) using AC coupling (e.g., DC removal circuit, possibly a capacitor if incoming signal is analog). Next, each scan region is normalized in power using a form of automatic gain control circuitry (e.g., RMS detector with feedback). The resulting output values r0, r1, . . . are stored in buffer (associated with a scan region) contains values that has an expected value of zero (due to DC removal), and have total absolute area (e.g., value roughly proportional absolute value of amplitudes summed, or an rms value) that is fairly stable from one buffer to next. The PRS outputs in
Referring to
In some examples, the recombination function uses a despreader that takes, for example, an orthogonal code as input, to produce multi-dimensional orthogonal outputs from a single PRS source or multiple PRS sources. In some examples, multiple outputs are generated that are not necessarily orthogonal by construction, possibly by applying multiple recombination function to a single PRS source, or multiple PRS sources.
In some examples, the recombination function consists of a serial to parallel converter, a bias extractor, a Hamming to Euclidean converter, all followed by a DC removal circuit. A bit serial output from PRS is thus recombined to have real-valued output, with output based on device unique statistics (DC bias in this case) of PRS when PRS is subject to different challenge values.
In various embodiments, the output of PRS can be a discrete time quantized signal (e.g., a fully digital value, for example, in two's complement representation per sample), can be a discrete time analog signal (e.g., analog signal for each sample), or can be a continuous time non-quantized (full analog) signal, or combinations of these (for a multi-modal example where multiple PRS are conceptually multiplexed into a single PRS entity). The recombiner can be fully digital (receiving fully digital input), or can be an analog recombiner (e.g., using switched capacitor circuits), or can contain an A/D and perform subsequent recombination in a fully digital fashion, or can use other hybrid mixed signal techniques, or combinations of these. Similarly, PRS, can natively have fully digital output, or can have an integrated A/D to output fully digital outputs, or combinations of these. In some systems, a sensor is present and that can reside with the recombiner or PRS or in a path in between, or combinations of these.
In some examples, the PRS generates its output values according to a random seed value, which may be independent of the challenge (e.g., may be a fixed seed). In some such examples, the random seed value may be set according to the challenge input, for example, based on a portion of the challenge, or as a function of the challenge.
As introduced above, in various embodiments, the PRS and the recombiner are either integrated in one device, or are fully or partially separate (e.g., physically distinct). An example of a partially separate implementation includes an implementation in which a sensor of an external source is integrated with the recombiner, but the source itself is external to the device.
In some examples, the recombiner is coupled to a reader, sensor or similar device, for instance in a same device or housing, and is used to collect readings or measurements that are derived from one or more of biometric readings (e.g., human fingerprint, retinal scan pattern, DNA reading, etc.), measurements of physical characteristics such as paint splotch patterns, speckle patterns, optical or magnetic readings, piece of paper or fabric, device-specific signatures from an integrated circuit, where recombination module is not physically co-located with PRS. Logically, a R-PUF is still formed when the recombiner is joined with a particular PRS instance.
In systems where one or more sensors are used, the sensor can exist at number of different points in the path between the biometric or manufactured source and the recombiner, while logically still implementing an R-PUF. For instance, the sensors can exist within device but separate from the recombiner, within device and integrated with the recombiner, integrated with PRS, or outside device and outside PRS, etc.
In some examples, the recombiner can be used with multiple different PRS. For instance, there may be one internal and one external PRS. More generally, examples include multiple external PRS, multiple internal PRS, or combinations thereof. The multiple PRS can be conceptually multiplexed into a single PRS, or selected according to criteria such as challenge inputs, for processing by a recombiner as outlined above.
In some examples, the pseudo-random source 110 and/or the recombiner 120 are implemented in circuitry, for instance, in special purpose circuitry on an integrated circuit. In some examples, the recombiner is implemented using a processor that implements the recombination using an instruction processor that performs arithmetic recombination of the PRS values. In some examples, the PRS provides analog values rather than digital values. In some examples, the recombiner operates directly on analog values, for example, in a charge-transfer clocked analog circuit.
In some examples, the pool of sources of the pseudo-random numbers includes distinct groups, each associated with a stage controlled by a different part of the challenge. In other examples, the groups may overlap such that different stages may have the opportunity to select from common elements.
In some examples, the PRS 110 includes a measurement module, for example, to make measurements of physical measurements. The measurements may be based on device characteristics, such as paint splotches or light speckle patterns, or biometric features, such as fingerprint or iris scans of a subject.
In some examples, the Ri generated above are further themselves recombined by tandem application of recombiner modules (possibly multiple times) to form the final Ri, using operations that include mathematical and logical operations.
In some examples, the outputs of the R-PUF as determined in sequence, while in other examples, they are determined in parallel.
In some examples, implementations of the R-PUF in
Arbiter PUFs with multiple arbiters and output processing) may have a large challenge space but natively do not necessarily produce real-valued outputs of sufficient resolution (e.g., at least 4 bits) for many applications, thus potentially complicating error correction. Oscillator PUFs and memory PUF may not have a sufficiently large challenge space. However, when applied to the oscillator PUF, recombination results in a PUF with a large challenge space which was not present in the original oscillator PUF.
Note that model-building (e.g., using machine learning) to build a software clone within reasonable time may be possible for PUFs using simple recombination functions. If resistance against model-building attacks is required, a more complex recombination function is preferably used.
In some embodiments, to support key generation, the following components are added to the recombined PUF of
Index Based Syndrome Coding, taking advantage of recombined real-valued outputs, can achieve a 16× to 64× reduction in error correction code complexity through use of soft decision coding.
Referring to
An illustrative use case for Multi-mode PUF is shown in
Implementations of the approaches described above can make use of hardware, software, or a combination of hardware and software. Hardware can include Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs), or other specific or configurable circuitry. Software can include instructions stored on a computer readable medium (e.g., in a semiconductor memory) for causing a processors (e.g., a controller, generally purpose CPU, etc.) to perform certain of the functions described above, for instance in conjunction with functions implemented in hardware. In some implementations functions are distributed among a number of devices (e.g., integrated circuits, computers, etc.) while in other implementations, the functions are hosted within one device, for instance, making it difficult or impossible for an adversary to gain access to internal volatile values generated during operation. In some examples, the functionality is embedded into special purpose devices, such as Radio Frequency IDentification devices (RFIDs), FPGAs, or secure processors.
It is to be understood that the foregoing description is intended to illustrate and not to limit the scope of the invention, which is defined by the scope of the appended claims. Other embodiments are within the scope of the following claims.
This application claims the benefit of U.S. Provisional Application No. 61/231,417, filed on Aug. 5, 2009, which is incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
4985614 | Pease | Jan 1991 | A |
5177352 | Carson | Jan 1993 | A |
5180901 | Hiramatsu | Jan 1993 | A |
5204902 | Reeds | Apr 1993 | A |
5247577 | Bailey | Sep 1993 | A |
5375169 | Seheidt | Dec 1994 | A |
5388157 | Austin | Feb 1995 | A |
5528231 | Patarin | Jun 1996 | A |
5768382 | Schneier | Jun 1998 | A |
5818738 | Effing | Oct 1998 | A |
5862094 | Kawabata | Jan 1999 | A |
5883956 | Le | Mar 1999 | A |
5920628 | Indeck | Jul 1999 | A |
5963104 | Buer | Oct 1999 | A |
6026293 | Osborn | Feb 2000 | A |
6161213 | Lofstrom | Dec 2000 | A |
6233339 | Kawano | May 2001 | B1 |
6246254 | Choukalos | Jun 2001 | B1 |
6289292 | Charlton | Sep 2001 | B1 |
6289453 | Walker | Sep 2001 | B1 |
6289455 | Kocher | Sep 2001 | B1 |
6301695 | Burnham | Oct 2001 | B1 |
6305005 | Burnham | Oct 2001 | B1 |
6324676 | Burnham | Nov 2001 | B1 |
6363485 | Adams | Mar 2002 | B1 |
6386456 | Chen | May 2002 | B1 |
6402028 | Graham, Jr. | Jun 2002 | B1 |
6529793 | Beffa | Mar 2003 | B1 |
6535016 | Choukalos | Mar 2003 | B2 |
6848049 | Tailliet | Jan 2005 | B1 |
7568113 | Linnartz | Jul 2009 | B2 |
7577850 | Barr | Aug 2009 | B2 |
7667572 | Husak et al. | Feb 2010 | B2 |
8244909 | Hanson et al. | Aug 2012 | B1 |
20010032318 | Yip | Oct 2001 | A1 |
20010033012 | Kommerling | Oct 2001 | A1 |
20020065574 | Nakada | May 2002 | A1 |
20020095594 | Dellmo | Jul 2002 | A1 |
20020106087 | Lotspiech | Aug 2002 | A1 |
20020107798 | Hameau | Aug 2002 | A1 |
20020128983 | Wrona | Sep 2002 | A1 |
20020150252 | Wong | Oct 2002 | A1 |
20020188857 | Orlando | Dec 2002 | A1 |
20020199110 | Kean | Dec 2002 | A1 |
20030204731 | Pochuev | Oct 2003 | A1 |
20030204743 | Devadas | Oct 2003 | A1 |
20030219121 | Van Someren | Nov 2003 | A1 |
20040136529 | Rhelimi et al. | Jul 2004 | A1 |
20040148509 | Wu | Jul 2004 | A1 |
20050051351 | De Jongh | Mar 2005 | A1 |
20070038871 | Kahlman | Feb 2007 | A1 |
20070039046 | Van Dijk | Feb 2007 | A1 |
20070044139 | Tuyls | Feb 2007 | A1 |
20070180009 | Gutnik | Aug 2007 | A1 |
20080044027 | Van Dijk | Feb 2008 | A1 |
20080059809 | Van Dijk | Mar 2008 | A1 |
20080106605 | Schrijen | May 2008 | A1 |
20090292921 | Braun et al. | Nov 2009 | A1 |
20100073147 | Guajardo Merchan et al. | Mar 2010 | A1 |
20110066670 | Yu | Mar 2011 | A1 |
Number | Date | Country |
---|---|---|
2344429 | Mar 2000 | CA |
19843424 | Mar 2000 | DE |
1100058 | May 2001 | EP |
1341214 | Sep 2003 | EP |
Entry |
---|
Arazi, B. “Interleaving Security and Efficiency Consiederations in the Design of Inexpensive IC Cards”. IEEE Proceedings on Computers and Digital Techniques. vol. 141, Issue 5, Publ Date Sep. 1994, pp. 265-270. |
Hon-Sum Wong et al, “Three-Dimensional “Atomistic” Simulation of Discrete Random Dopant Distribution Effects in Sub-0.1μm MOSFET's”.IEDM, 29(2):705-708, 1993. |
Bennet Yee, “Using Secure Coprocessors,” Carnegie Mellon University, Pittsburg, PA. May 1994. |
Ross Anderson et al. “Low Cost Attacks on Tamper Resistant Devices” Cambridge University, Cambridge, England. Apr. 1997. |
Milor et al., “Logic Product Speed Evaluation and Forecasting During the early phases of Process Technology Development Using Ring Oscillator Data,” 2nd International Work Statistical Metrology, 1997 pp. 20-23. |
Ross Anderson et al. “Tamper Resistance—a Cautionary Note”. Cambridge University, Cambridge, England. Nov. 1996. |
Tuyis et al., “Information-Theoretic Security Analysis of Physical Uncloneable Functions,” Proceedings ISIT 2004 (Chicago), p. 141. |
Omura, J.K., Novel Applications of Cryptogrtaphy in Digital Communications, IEEE Comm Mag., May 1990, pp. 21-29. |
Srinivas Devadas et al., “Synthesis of Robust Delay-Fault Testable Circuits: Practice” Massachusetts Institute of Technology, Cambridge, MA Mar. 1992. |
Srinivas Devadas et al., “Synthesis of Robust Delay-Fault Testable Circuits: Theory” Massachusetts Institute of Technology, Cambridge, MA Jan. 1992. |
Sean W. Smith et al. “Building a High-Performance, Programmable Secure Coprocessor”. IBM T.J. Watson Research Center, Yorktown Heights, NY. Oct. 16, 1998. |
Duane S Boning et al., “Models of Process Variations in Device and Interconnect,” Massachusetts Institute of Technology, Cambridge, MA Aug. 23, 1999. |
Ravikanth, Pappu Srinivasa . “Physical One-Way Functions”. Massachusetts Institute of Technology, Cambridge, MA. Mar. 2001. |
Blaise Gassend et al., “Silicon Physical Unknown Functions and Secure Smartcards.” Massachusetts Institute of Technology, Cambridge, MA May 13, 2002. |
Blaise Gassend et al. “Controlled Physical Unknown Functions Applications to Secure Smartcards and Certified Execution,” Massachusetts Institute of Technology, Cambridge, Jun. 10, 2002. |
Blaise Gassend et al., “Silicon Physical Random Functions”, MIT, Proceedings of the Computer and Communication Security Conference, Nov. 2002, Memo 456. |
Blaise Gassend, “Physical Random Functions,” Massachusetts Institute of Technology, Cambridge, MA Feb. 2003. |
Gassend, B.L.P., Physical Random Functions; Thesis, Thesis at the Massachusetts Institute of Technology. pp. 1-89 (Feb. 1, 2003) XP002316843. |
Daihyun Lim, “Extracting Secret Keys from Integrated Circuits” Massachusetts Institute of Technology, Cambridge, MA, May 2004. |
Lee et al., “A Technique to Build a Secret Key in Integrated Circuits for Identification and Authentication Applications,” Massachusetts Institute of Technology (CSAIL) Jun. 2004. |
Xilinx (Ralf Krueger) “Using High Security Features in Virtex-II Series FPGAs” www.xilinx.com, [printed Jul. 8, 2004]. |
Ranasinghe et al., “Secutiry and Provacy Solutions for Low-Cost RFID Systems.” (2004). |
Tuyls, Pim and Lejla Batina, “RFID-Tags for Anti-Counterfeiting,” Topics in Crytography, vol. 3860/2006, No. LNCS3860, (Feb. 13, 2005) XP002532233. |
Tuyls et al., “Security Analysis of Physical Uncloneable Functions,” Proc. 9th Conf. on Financial Cryptography and Data Security , Mar. 2005, LNCS 3570, pp. 141-155. |
G. Edward Suh, et al., “Design and Implementation of the AEGIS Single-Chip Secure Processor Using Physical Random Functions,” In the proceedings of the 32nd International Symposium on Computer Architecture, Madison, Wisconsin, Architecture, Jun. 2005, (Memo-483). |
Skoric et al., “Robust Key Extraction from Physical Uncloneable Functions,” Proc. Applied Cryptography and Network Security 2005, LNCS 3531, pp. 407-422. |
Ulrich Ruhrmair “SIMPL Systems: On a Public Key Variant of Physical Unclonable Functions” Cryptology ePrint Archive, Report 2009/255. |
Number | Date | Country | |
---|---|---|---|
20110066670 A1 | Mar 2011 | US |
Number | Date | Country | |
---|---|---|---|
61231417 | Aug 2009 | US |