Nothing Special   »   [go: up one dir, main page]

Xu et al., 2024 - Google Patents

Security Evaluation of Feed-Forward Interpose PUF Against Modelling Attacks

Xu et al., 2024

Document ID
16461131934803917622
Author
Xu W
Pang L
Tang Y
Chen M
Publication year
Publication venue
2024 IEEE 4th International Conference on Power, Electronics and Computer Applications (ICPECA)

External Links

Snippet

Physical unclonable function (PUF) is a lightweight hardware-safe circuit structure for Internet of Things (IoT). The susceptibility to neural network modeling attacks stands out as a critical consideration in the design of PUF structures. Interpose PUF (IPUF) is a PUF variant …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3278Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/50Computer-aided design
    • G06F17/5009Computer-aided design using simulation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Zhang et al. Voltage over-scaling-based lightweight authentication for IoT security
Yang et al. Hardware designs for security in ultra-low-power IoT systems: An overview and survey
Beckmann et al. Hardware-based public-key cryptography with public physically unclonable functions
Shi et al. Approximation attacks on strong PUFs
Sahoo et al. A multiplexer-based arbiter PUF composition with enhanced reliability and security
Mahmoud et al. Combined modeling and side channel attacks on strong PUFs
Sahoo et al. A case of lightweight PUF constructions: Cryptanalysis and machine learning attacks
Potkonjak et al. Public physical unclonable functions
Chen et al. Characterization of the bistable ring PUF
Aghaie et al. TI-PUF: Toward side-channel resistant physical unclonable functions
Wu et al. Flam-puf: A response–feedback-based lightweight anti-machine-learning-attack puf
Hemavathy et al. Arbiter puf—a review of design, composition, and security aspects
Chatterjee et al. Theory and application of delay constraints in arbiter PUF
Mispan et al. Cost-efficient design for modeling attacks resistant PUFs
Baek et al. A reconfigurable SRAM based CMOS PUF with challenge to response pairs
Anandakumar et al. Implementation of efficient XOR arbiter PUF on FPGA with enhanced uniqueness and security
Wang et al. A dynamically configurable PUF and dynamic matching authentication protocol
Mills et al. Design and evaluation of a delay-based FPGA physically unclonable function
Lai et al. A robust area-efficient physically unclonable function with high machine learning attack resilience in 28-nm CMOS
Hou et al. A dynamically configurable LFSR-based PUF design against machine learning attacks
Mispan et al. Lightweight obfuscation techniques for modeling attacks resistant PUFs
Cui et al. An efficient ring oscillator PUF using programmable delay units on FPGA
Williams et al. Mc-PUF: Memory-based and machine learning resilient strong PUF for device authentication in Internet of Things
Ma et al. Machine learning attacks resistant strong PUF design utilizing response obfuscates challenge with lower hardware overhead
KR20220041048A (en) Systems and methods for using hybrid boolean networks as functions that cannot be physically replicated