Nothing Special   »   [go: up one dir, main page]

WO2014192077A1 - Authentication processing device and authentication processing method - Google Patents

Authentication processing device and authentication processing method Download PDF

Info

Publication number
WO2014192077A1
WO2014192077A1 PCT/JP2013/064747 JP2013064747W WO2014192077A1 WO 2014192077 A1 WO2014192077 A1 WO 2014192077A1 JP 2013064747 W JP2013064747 W JP 2013064747W WO 2014192077 A1 WO2014192077 A1 WO 2014192077A1
Authority
WO
WIPO (PCT)
Prior art keywords
product
response
authentication
challenge
error rate
Prior art date
Application number
PCT/JP2013/064747
Other languages
French (fr)
Japanese (ja)
Inventor
孝一 清水
Original Assignee
三菱電機株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 三菱電機株式会社 filed Critical 三菱電機株式会社
Priority to PCT/JP2013/064747 priority Critical patent/WO2014192077A1/en
Priority to TW102136281A priority patent/TW201445349A/en
Publication of WO2014192077A1 publication Critical patent/WO2014192077A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3278Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]

Definitions

  • the present invention relates to an authentication processing apparatus and an authentication processing method for determining that a device is a genuine product manufactured by an authorized manufacturer.
  • Patent Document 1 proposes a method for distinguishing between a genuine product and a counterfeit product by confirming whether the time required for the authentication process of the device is within a predetermined range.
  • the counterfeit product uses a device having a lower grade than the regular product or an inexpensive microcomputer, and therefore tends to have a longer processing time than the regular product. Therefore, even if the function is completely imitated, counterfeits with a long processing time can be eliminated.
  • PUF Physical Unclonable Function
  • Patent Document 1 the processing time can be observed from the outside, and the attacker can know the processing time relatively easily.
  • the counterfeit product uses a low-grade device, the high-speed processing time of the genuine product is not imitated.
  • the device price decreases, and there is a possibility that a device of the same grade as the genuine product can be used at low cost. As a result, a counterfeit product that imitates the processing time may be produced.
  • Patent Document 2 it is known that some existing PUFs as disclosed in Patent Document 2 can be attacked by machine learning. That is, by modeling the PUF, the behavior of the device-specific PUF can be expressed as a model parameter, and the parameter can be obtained by machine learning. As a result, a device-specific response to the challenge can be calculated with a software model. As described above, there is a possibility that a counterfeit product is made even by a method using the PUF.
  • the present invention has been made to solve the above-described problems. Even when a device function, a circuit itself, or a device-specific behavior such as a PUF is copied, it is still imitated. It is an object of the present invention to obtain an authentication processing apparatus and an authentication processing method that can detect a product.
  • the authentication processing apparatus uses a PUF circuit designed to output a response, which is information unique to each semiconductor device, for each challenge input based on the physical feature amount of the semiconductor device.
  • An authentication processing apparatus including an authentication circuit that performs an authentication process as to whether or not a semiconductor device that is an authentication target product is a genuine product based on a response that is unique information.
  • N is an integer of 2 or more
  • the percentage of the normal response that is not obtained when the challenge input is repeated N (N is an integer of 2 or more) times for the authentic product is stored in the database in advance as an authentic error rate.
  • N is an integer of 2 or more
  • For the generated response column calculate the error rate of the authentication target product based on the genuine product response registered in the database, and the calculated error rate of the authentication target product is the genuine product registered in the database. When it is within the allowable range including the error rate, it is determined that the authentication target product is a genuine product.
  • the authentication processing method uses a PUF circuit designed to output a response, which is information unique to each semiconductor device, for each challenge input based on the physical feature of the semiconductor device.
  • An authentication processing method in an authentication processing apparatus including an authentication circuit that performs authentication processing as to whether or not a semiconductor device that is an authentication target product is a genuine product based on a response that is unique information, the authentication circuit
  • N is an integer of 2 or more
  • a response string consisting of N responses is generated, and the error rate of the authentication target product is calculated based on the genuine response registered in the database for the generated response sequence.
  • the rate is within an allowable range including the regular product error rate registered in the database, a verification step of determining that the product to be authenticated is a regular product is provided.
  • an authentication processing apparatus and an authentication processing method that can detect a counterfeit product can be obtained.
  • FIG. 1 is an explanatory diagram showing a basic idea of an authentication processing device and an authentication processing method according to Embodiment 1 of the present invention.
  • the product 101 includes a PUF circuit 102 therein, and is designed to return a device-specific response 104 to the challenge 103 by using the PUF circuit 102.
  • “repetition processing” is considered in which a response string is generated by obtaining a response to a same challenge multiple times.
  • FIG. 1 shows a case where responses are obtained five times.
  • the value is returned five times as the response 104 (corresponding to the response string), four of which are 1 and 1 is 0. .
  • the error rate Since the number of repetitions is as small as 5, the error rate has a coarse accuracy of 20%. However, in practice, the accuracy of the regular product error rate can be increased by arbitrarily increasing the number of repetitions. . Here, in order to simplify the description, the number of repetitions is assumed to be 5 thereafter.
  • the authentic product can still be authenticated.
  • the response to each challenge and the error rate are registered in the database 105 when the product is manufactured.
  • the data 106 represents information on the genuine product 1, information indicating a challenge-response relationship in which a response 1 is returned for the challenge A and a response 0 is returned for the challenge B; Statistical information that the error rate is 20% is included.
  • Such data is registered in the database 105 in advance.
  • the error rate can use an individual error rate for each challenge / response or an average error rate for all challenge / responses. In the following, the explanation will be made on the assumption that the average error rate for all challenges and responses is used.
  • verify both the response to a challenge and the error rate For example, when B is given 5 times as a challenge 108 to the product 107, 4 times 0 and 1 time 1 are obtained as a response 109 (corresponding to a response string). This verification result indicates that the response when the challenge B is given to the product 107 is 0 and the error rate is 20%.
  • the verification result is compared with the genuine product data 106 registered in advance in the database 105, it can be seen that the product 107 is the genuine product 1 because they match.
  • the counterfeit product 110 imitates the challenge response of the PUF of the regular product 1 and can return a correct response to the given challenge 111. Therefore, if B is given five times as the challenge 111, the correct value 0 is returned five times as the response 112.
  • This verification result indicates that the response 112 (corresponding to the response string) when the imitation product 110 is given B as the challenge 111 is 0 and the error rate is 0%. Since the error rate of 0% based on the verification result does not match the error rate of 20% of the data 106 of the regular product 1, it can be seen that the verified product is a counterfeit product.
  • FIG. 2 is a circuit configuration diagram for repeatedly executing processing by the authentication processing device according to Embodiment 1 of the present invention.
  • the circuit (authentication circuit) 201 illustrated in FIG. 2 includes a challenge register 203, a control circuit 204, a PUF circuit 205, and a response evaluation circuit 206.
  • the circuit 201 repeatedly generates a PUF response to the challenge 202, and as a result, outputs a response 210 and statistical information 215 regarding the error rate.
  • the overall operation is controlled by the control circuit 204.
  • the response 210 output as a result of repetition is configured so that which of 0/1 is generated, that is, a majority decision result.
  • the response evaluation circuit 206 determines a final response 210 as a result of the iterative processing.
  • the N-bit counter 208 counts the number of 0s and 1s in (2 N-1) iterations. Specifically, first, the N-bit counter 208 is initialized with 0, and each time a response is generated by the PUF circuit 205, the response value is added to the current value of the counter 208 using the adder 207. The result is newly held as the value of the counter 208.
  • the value of the N-bit counter 208 is 0, and the value of the counter 208 increases according to the number of times that 1 is included in the response. If so, the value of the counter 208 is (2 to the power of N-1). At this time, the most significant bit of the N-bit counter 208 is a 0/1 majority result in response generation repetition.
  • the response evaluation circuit 206 holds the value of the most significant bit of the N-bit counter 208 in the response register 209 and outputs this as the final response 210.
  • the control circuit 204 evaluates the value of the N-bit counter 208 and outputs statistical information 215 regarding the error rate.
  • the error number evaluation circuit 211 in the control circuit 204 is a circuit that obtains and outputs the number of errors from the counter value, and sets the counter value 212 to 00 ... 0 (all 0) or 11 ... 1 (all 1). XOR the data 213 indicated by () and hold it in the error count register 214. The value of the data 213 is 00... 0 when the most significant bit of the counter value is 0, and 11.
  • FIG. 3 is a flowchart relating to a series of repetitive processes executed by the authentication processing apparatus having the configuration of FIG. 2 in the first embodiment of the present invention. Hereinafter, the flow of a series of processes will be described according to each step.
  • step S301 the challenge 202 is input to the circuit 201 in step S301.
  • step S302 a loop for repeating the processes of steps S303 to S305 N times is started.
  • step S303 a response of the PUF circuit 205 to the challenge 202 input in the previous step S301 is generated.
  • step S304 the processing is divided according to the response value of the PUF circuit 205 generated in the previous step S303. Specifically, if the value is 0, the process proceeds to step S306, and if the value is 1, the process proceeds to step S305.
  • step S305 the value of the N-bit counter 208 is incremented by one.
  • step S306 the series of processes in steps S303 to S305 described above are repeated, and the loop is terminated by repeating N times.
  • step S307 the response register 209 in the response evaluation circuit 206 obtains a final response 210 from the counter value of the N-bit counter 208 obtained in a loop of N times.
  • step S308 the error count evaluation circuit 211 in the control circuit 204 calculates the error count 215 from the counter value of the N-bit counter 208 determined in a loop of N times.
  • the response evaluation circuit 206 outputs the response 210 obtained in the previous step S307 from the circuit 201 in step S309. Further, in step S310, the control circuit 204 outputs the number of errors 215 obtained in the previous step S308 from the circuit 201.
  • step S311 the subsequent processing is performed by dividing into registration processing or verification processing. Specifically, when the processing result is registered in the database 105, the process proceeds to step S312. When the verification based on the processing result is performed, the process proceeds to S313.
  • step S312 the response 210 output from the circuit 201 in the previous step S309 and the error count 215 output from the circuit 201 in the previous step S310 are registered in the database 105, and the series of processes ends.
  • step S313 when the process proceeds to step S313, the response 210 output from the circuit 201 in the previous S309, the error count 215 output from the circuit 201 in the previous step S310, and the regularity already registered in the database 105 are obtained. If at least one of the response 210 or the number of errors 215 does not match, it is determined that the product is a counterfeit product, and the series of processes ends.
  • the statistical information (corresponding to the number of errors or error rate for repeated processing) of the PUF response is the genuine data.
  • an authentication method that can still detect a counterfeit and a circuit therefor are realized.
  • the error rate calculated for the product to be certified is within the allowable range including the error rate of the regular product data, so it is a genuine product. It can be judged.
  • Embodiment 2 FIG. In the first embodiment, the case has been described in which a response string is generated by repeatedly using the same challenge and the verification process is performed. On the other hand, in the second embodiment, a case where a response sequence is generated using different challenges and a verification process is performed will be described.
  • FIG. 4 is an explanatory diagram of the verification process according to the second embodiment of the present invention. Specifically, the verification process of the second embodiment using a different challenge is shown in contrast to the verification process of the first embodiment that repeatedly uses the same challenge. Note that database registration at the time of manufacturing in the second embodiment is performed in the same manner as in the first embodiment.
  • the verification process 401 shown in the upper part of FIG. 4 represents the verification process using the same challenge as in the first embodiment.
  • the same challenge 403 is input to the genuine product 402 that is the verification target product, and a response 404 (corresponding to a response string) is output.
  • the authenticator collates the data 405 consisting of repeated responses of the genuine product acquired from the database 105 with the actual response 404 for the genuine product 402 to confirm that four of the five responses are correct, and that The result error rate can be confirmed to be 20%, and the verification target product can be confirmed to be the regular product 402.
  • a verification process 406 shown in the lower part of FIG. 4 represents a verification process using different challenges according to the second embodiment.
  • a different challenge 408 is input to the regular product 407 that is the verification target product, and a response 409 (corresponding to a response string) is output.
  • the authenticator collates the data 410, which is obtained from the database 105 and includes the genuine response 409 for each challenge, and the actual response 409 for the genuine product 407, so that four responses out of five are correct. As a result, it can be confirmed that the error rate is 20%, and the verification target product can be confirmed to be a regular product 407.
  • responses to different challenges A to E are output only once. For this reason, just by eavesdropping on the response 409, it is not possible to determine which response to which challenge is correct and to which challenge the response is incorrect, and the error rate cannot be estimated. Therefore, imitation of the error rate can be prevented.
  • FIG. 5 is a circuit configuration diagram for executing verification processing 406 using different challenges in the authentication processing apparatus according to Embodiment 2 of the present invention.
  • the circuit (authentication circuit) 501 illustrated in FIG. 5 includes a control circuit 504, a selector 505, a challenge register 506, an adder 507, a PUF circuit 508, and a response register 509.
  • the circuit 501 when the challenge 502 is input, the circuit 501 generates an increasing sequence of different challenges starting from the value of the challenge 502, and sequentially outputs responses 503 for the different challenges.
  • the entire circuit is controlled by the control circuit 504.
  • the circuit is roughly divided into a challenge register 506, a PUF circuit 508, and a response register 509, and is a circuit that generates a response of the PUF circuit 508 with respect to a given challenge 502.
  • a selector 505 in front of the challenge register 506 the value of the challenge register 506 can be changed.
  • the adder 507 increments the challenge value by 1.
  • the method for changing the challenge is not limited to this method.
  • a configuration in which a value is changed using a linear feedback shift register may be used.
  • the circuit 501 is shown as a configuration that does not have a circuit for obtaining an error rate therein, but the error rate is similar to the circuit 201 of FIG. 2 in the first embodiment.
  • An error number evaluation circuit 211 for obtaining the above may be included.
  • FIG. 6 is a flowchart relating to a series of repetitive processes executed by the authentication processing apparatus having the configuration of FIG. 5 in the second embodiment of the present invention. Hereinafter, the flow of a series of processes will be described according to each step.
  • the registration process or the verification process is divided into subsequent processes. Specifically, if the processing result is registered in the database 105, the process proceeds to step S602, and if verification based on the processing result is performed, the process proceeds to S609.
  • step S602 When the process proceeds to step S602 for registration in the database, a loop that repeats the subsequent steps S603 to S605 M times is started.
  • step S ⁇ b> 603 the challenge 502 is input to the circuit 501.
  • step S604 a response of the PUF circuit 508 to the challenge 502 input in the previous step S603 is generated.
  • step S605 the response generated in step S604 is output.
  • step S606 the series of processes in steps S603 to S605 described above is repeated M times, and the loop is terminated.
  • step S607 a final response and an error rate are calculated from the M PUF responses for the same challenge obtained in a loop of M times.
  • step S608 the response and error rate obtained in the previous step S607 are registered in the database 105, and the series of processes ends.
  • the response obtained by the series of steps S602 to S609 is for one challenge, and for different challenges, the database is constructed by individually performing these series of processes. It becomes.
  • the error rate can be calculated as the average of the error rates obtained for each of the different challenges.
  • step S610 a loop is started in which the processes in subsequent steps S611 to S613 are repeated N times.
  • step S611 a response of the PUF circuit 508 to the challenge 502 input in the previous step S609 is generated.
  • step S612 the response generated in step S611 is output.
  • step S613 the adder 507 increments the challenge value by one.
  • step S614 the series of processes in steps S611 to S613 described above is repeated N times, and the loop is terminated.
  • step S615 the response sequence of the PUF circuit 508 for N different challenges obtained in a loop of N iterations is compared with the response sequence based on the value of the genuine product already registered in the database 105. However, it will be judged whether the product is genuine or counterfeit.
  • the error rate is also taken into consideration to determine whether the product is a genuine product. It is possible to identify whether or not.
  • the second embodiment instead of repeatedly using the same challenge, it is possible to prevent imitation of an error rate by determining whether the product is a genuine product based on a response result to a different challenge.
  • An authentication method capable of detecting a counterfeit product more reliably and a circuit therefor are realized.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)
  • Storage Device Security (AREA)

Abstract

An authentication processing device is provided with an authentication circuit for using a PUF circuit to determine whether a semiconductor device under authentication is an authentic device on the basis of responses, which are unique information, to challenge inputs. The authentication circuit stores authentic-device responses to challenge inputs to an authentic device and an authentic-device error rate, which is the rate at which authentic-device responses are not obtained in response to repeated challenge inputs to an authentic device, in advance in a database. At the time of the authentication of the device under authentication, the authentication circuit calculates, on the basis of the authentic-device responses stored in the database, the error rate of the device under authentication for a sequence of responses generated for N challenge repetitions and determines that the device under authentication is an authentic device if the calculated error rate is within a permissible range that includes the authentic-device error rate.

Description

認証処理装置および認証処理方法Authentication processing apparatus and authentication processing method
 本発明は、デバイスが正規の製造者によって製造された正規品であることを判定するための認証処理装置および認証処理方法に関するものである。 The present invention relates to an authentication processing apparatus and an authentication processing method for determining that a device is a genuine product manufactured by an authorized manufacturer.
 製品機器の模倣品が問題となっている。安価な模倣品に売上を奪われる、あるいは粗悪な模倣品が原因でブランドイメージが低下するなど、正規の製造者への様々な被害が生じている。また、例えば、開かないエアバッグなど、正しく機能しない模倣品によって、消費者の安全性が脅かされる場合もある。このような背景から、模倣品を阻止することが、ますます重要になっている。 模倣 Imitation of product equipment is a problem. Various damages to legitimate manufacturers have occurred, such as the loss of sales by cheap counterfeit products, or a decline in brand image due to poor counterfeit products. In addition, for example, counterfeit goods that do not function properly, such as airbags that do not open, may threaten consumer safety. Against this background, it is becoming increasingly important to prevent counterfeits.
 このような模倣品を阻止するために、機器の動作時に、まずその機器が正規品であることを確認する手続きが考えられる。特に、暗号処理を利用した認証は、模倣が困難で安全性が高く、正規品判定の目的で広く使用されている。しかしながら、近年の解析技術の高まりによって、認証処理を行うLSIなどのデバイスの機能がコピーされたり、回路そのものがコピーされたりする危険性が出てきた。このような背景から、模倣自体を防止する技術とともに、仮に模倣を許してしまったとしても、なお、何らかの対処を可能とする技術が重要になってきている。 In order to prevent such counterfeits, a procedure for confirming that the device is genuine can be considered when the device is operating. In particular, authentication using cryptographic processing is difficult to imitate and has high security, and is widely used for the purpose of determining genuine products. However, with the recent increase in analysis technology, there has been a risk that the function of a device such as an LSI that performs authentication processing will be copied or the circuit itself will be copied. Against this background, techniques that enable some countermeasures are becoming important along with techniques that prevent imitation itself, even if imitation is allowed.
 デバイスがコピーされてもなお模倣品を検出できる従来の認証方法がある(例えば、特許文献1参照)。特許文献1では、デバイスが認証処理に要する時間が所定内であるかを確認することで、正規品と模倣品とを区別する方法が提案されている。模倣品は、正規品よりもグレードの低いデバイスや安価なマイコンを使用しているため、正規品よりも処理時間が長くなる傾向がある。したがって、たとえ機能を完全に模倣されたとしても、処理時間が長い模倣品を排除できる。 There is a conventional authentication method that can detect a counterfeit product even if the device is copied (see, for example, Patent Document 1). Patent Document 1 proposes a method for distinguishing between a genuine product and a counterfeit product by confirming whether the time required for the authentication process of the device is within a predetermined range. The counterfeit product uses a device having a lower grade than the regular product or an inexpensive microcomputer, and therefore tends to have a longer processing time than the regular product. Therefore, even if the function is completely imitated, counterfeits with a long processing time can be eliminated.
 また、回路そのもののコピーに対抗できる認証方法として、Physical Unclonable Function(PUF)のレスポンスを利用し、正規品を認証する方法がある(例えば、特許文献2参照)。PUFは、デバイスの個体ごとに異なる物理量に応じて振る舞いが決まる関数であり、与えられた入力(チャレンジ)に対し、デバイスごとに異なる出力(レスポンス)が生成される。したがって、たとえ回路をコピーされたとしても、模倣品が出力するレスポンスは正規品とは異なるため、模倣品を検出することが可能である。 In addition, as an authentication method that can counter the copy of the circuit itself, there is a method of authenticating a genuine product using a response of Physical Unclonable Function (PUF) (for example, see Patent Document 2). The PUF is a function whose behavior is determined according to a different physical quantity for each individual device, and an output (response) different for each device is generated for a given input (challenge). Therefore, even if the circuit is copied, the response output by the counterfeit product is different from that of the regular product, and thus it is possible to detect the counterfeit product.
特開2012-174195号公報JP 2012-174195 A 特開2011-123909号公報JP 2011-123909 A
 しかしながら、特許文献1の方法や特許文献2に代表されるPUFを利用する方法には、以下の問題点が残されている。特許文献1の方法では、処理時間は、外部から観測可能であり、攻撃者は、比較的容易に処理時間を知ることができる。ただし、模倣品は、グレードの低いデバイスを使用するという前提があるため、正規品の高速な処理時間は、模倣されない。しかしながら、製品発売から時間が経てば、デバイス価格が低下し、正規品と同じグレードのデバイスを安価に使用できる可能性がある。その結果、処理時間を模倣した模倣品が作られてしまう可能性がある。 However, the following problems remain in the method of Patent Document 1 and the method of using a PUF represented by Patent Document 2. In the method of Patent Document 1, the processing time can be observed from the outside, and the attacker can know the processing time relatively easily. However, since it is assumed that the counterfeit product uses a low-grade device, the high-speed processing time of the genuine product is not imitated. However, as time elapses from the product launch, the device price decreases, and there is a possibility that a device of the same grade as the genuine product can be used at low cost. As a result, a counterfeit product that imitates the processing time may be produced.
 また、特許文献2に示されたような既存のいくつかのPUFは、機械学習で攻撃できることが知られている。すなわち、PUFをモデル化して、デバイス固有のPUFの振る舞いをモデルのパラメータとして表し、そのパラメータを機械学習で求めることができる。その結果、チャレンジに対するデバイス固有のレスポンスをソフトウェアモデルで計算することが可能となる。以上により、PUFを利用した方法でも、模倣品が作られてしまう可能性がある。 Also, it is known that some existing PUFs as disclosed in Patent Document 2 can be attacked by machine learning. That is, by modeling the PUF, the behavior of the device-specific PUF can be expressed as a model parameter, and the parameter can be obtained by machine learning. As a result, a device-specific response to the challenge can be calculated with a software model. As described above, there is a possibility that a counterfeit product is made even by a method using the PUF.
 本発明は、前記のような課題を解決するためになされたものであり、デバイスの機能や、回路そのもの、あるいは、PUFのようなデバイス固有の振る舞いをコピーされてしまった場合にも、なお模倣品を検出可能とする認証処理装置および認証処理方法を得ることを目的とする。 The present invention has been made to solve the above-described problems. Even when a device function, a circuit itself, or a device-specific behavior such as a PUF is copied, it is still imitated. It is an object of the present invention to obtain an authentication processing apparatus and an authentication processing method that can detect a product.
 本発明に係る認証処理装置は、半導体デバイスの物理的な特徴量に基づき、各チャレンジ入力に対し個々の半導体デバイスに固有の情報であるレスポンスを出力するように設計されたPUF回路を利用して、固有の情報であるレスポンスに基づいて認証対象品である半導体デバイスが正規品であるか否かの認証処理を行う認証回路を備えた認証処理装置であって、認証回路は、正規品におけるチャレンジ入力に対する正規品レスポンスとともに、正規品に対してチャレンジ入力をN(Nは2以上の整数)回繰り返したときに正規品レスポンスが得られない割合を正規品エラー率としてあらかじめデータベースに記憶しておき、認証対象品に対する認証を行う際には、チャレンジをN回繰り返してN個のレスポンスからなるレスポンス列を生成し、生成したレスポンス列に対して、データベースに登録されている正規品レスポンスに基づいて認証対象品のエラー率を算出し、算出した認証対象品のエラー率が、データベースに登録されている正規品エラー率を含む許容範囲内にある場合には、認証対象品が正規品であると判断するものである。 The authentication processing apparatus according to the present invention uses a PUF circuit designed to output a response, which is information unique to each semiconductor device, for each challenge input based on the physical feature amount of the semiconductor device. , An authentication processing apparatus including an authentication circuit that performs an authentication process as to whether or not a semiconductor device that is an authentication target product is a genuine product based on a response that is unique information. Along with the authentic response to the input, the percentage of the normal response that is not obtained when the challenge input is repeated N (N is an integer of 2 or more) times for the authentic product is stored in the database in advance as an authentic error rate. When authenticating a product subject to authentication, the challenge is repeated N times to generate a response sequence consisting of N responses. For the generated response column, calculate the error rate of the authentication target product based on the genuine product response registered in the database, and the calculated error rate of the authentication target product is the genuine product registered in the database. When it is within the allowable range including the error rate, it is determined that the authentication target product is a genuine product.
 また、本発明に係る認証処理方法は、半導体デバイスの物理的な特徴量に基づき、各チャレンジ入力に対し個々の半導体デバイスに固有の情報であるレスポンスを出力するように設計されたPUF回路を利用して、固有の情報であるレスポンスに基づいて認証対象品である半導体デバイスが正規品であるか否かの認証処理を行う認証回路を備えた認証処理装置における認証処理方法であって、認証回路において、正規品におけるチャレンジ入力に対する正規品レスポンスとともに、正規品に対してチャレンジ入力をN(Nは2以上の整数)回繰り返したときに正規品レスポンスが得られない割合を正規品エラー率としてあらかじめデータベースに記憶しておく登録ステップと、認証対象品に対する認証を行う際に、チャレンジをN回繰り返してN個のレスポンスからなるレスポンス列を生成し、生成したレスポンス列に対して、データベースに登録されている正規品レスポンスに基づいて認証対象品のエラー率を算出し、算出した認証対象品のエラー率が、データベースに登録されている正規品エラー率を含む許容範囲内にある場合には、認証対象品が正規品であると判断する検証ステップとを備えるものである。 The authentication processing method according to the present invention uses a PUF circuit designed to output a response, which is information unique to each semiconductor device, for each challenge input based on the physical feature of the semiconductor device. An authentication processing method in an authentication processing apparatus including an authentication circuit that performs authentication processing as to whether or not a semiconductor device that is an authentication target product is a genuine product based on a response that is unique information, the authentication circuit In addition to the regular product response to the challenge input in the regular product, the ratio that the regular product response is not obtained when the challenge input is repeated N (N is an integer of 2 or more) times for the regular product in advance as the regular product error rate. Repeat the challenge N times when performing registration steps stored in the database and authenticating products for authentication A response string consisting of N responses is generated, and the error rate of the authentication target product is calculated based on the genuine response registered in the database for the generated response sequence. When the rate is within an allowable range including the regular product error rate registered in the database, a verification step of determining that the product to be authenticated is a regular product is provided.
 本発明によれば、PUFのレスポンスに関する統計情報として、繰り返し処理に対するエラー率を利用して正規品であるか否かを検証することにより、デバイスの機能や、回路そのもの、あるいは、PUFのようなデバイス固有の振る舞いをコピーされてしまった場合にも、なお模倣品を検出可能とする認証処理装置および認証処理方法を得ることができる。 According to the present invention, as statistical information regarding the response of the PUF, by verifying whether or not it is a genuine product using an error rate for repeated processing, the function of the device, the circuit itself, or the PUF Even when a device-specific behavior is copied, an authentication processing apparatus and an authentication processing method that can detect a counterfeit product can be obtained.
本発明の実施の形態1における認証処理装置および認証処理方法の基本アイデアを示す説明図である。It is explanatory drawing which shows the basic idea of the authentication processing apparatus and authentication processing method in Embodiment 1 of this invention. 本発明の実施の形態1における認証処理装置で繰り返し処理を実行するための回路構成図である。It is a circuit block diagram for performing an iterative process with the authentication processing apparatus in Embodiment 1 of this invention. 本発明の実施の形態1における図2の構成を備えた認証処理装置で実行される一連の繰り返し処理に関するフローチャートである。It is a flowchart regarding a series of repetition processes performed with the authentication processing apparatus provided with the structure of FIG. 2 in Embodiment 1 of this invention. 本発明の実施の形態2における検証処理の説明図である。It is explanatory drawing of the verification process in Embodiment 2 of this invention. 本発明の実施の形態2における認証処理装置で、異なるチャレンジを用いる検証処理を実行するための回路構成図である。It is a circuit block diagram for performing the verification process which uses a different challenge with the authentication processing apparatus in Embodiment 2 of this invention. 本発明の実施の形態2における図5の構成を備えた認証処理装置で実行される一連の繰り返し処理に関するフローチャートである。It is a flowchart regarding a series of repetition processes performed with the authentication processing apparatus provided with the structure of FIG. 5 in Embodiment 2 of this invention.
 以下、本発明の認証処理装置および認証処理方法の好適な実施の形態につき図面を用いて説明する。 Hereinafter, preferred embodiments of an authentication processing apparatus and an authentication processing method of the present invention will be described with reference to the drawings.
 実施の形態1.
 本発明の基本アイデアは、PUFのレスポンスそのものだけでなく、PUFのレスポンスに関する統計情報をさらに利用して認証を行うことである。図1は、本発明の実施の形態1における認証処理装置および認証処理方法の基本アイデアを示す説明図である。製品101は、内部にPUF回路102を備え、これを利用することで、チャレンジ103に対してデバイス固有のレスポンス104を返すように設計されている。ここで、ある同一のチャレンジに対するレスポンスを複数回得ることでレスポンス列を生成する「繰り返し処理」を考える。
Embodiment 1 FIG.
The basic idea of the present invention is to perform authentication using not only the PUF response itself but also statistical information regarding the PUF response. FIG. 1 is an explanatory diagram showing a basic idea of an authentication processing device and an authentication processing method according to Embodiment 1 of the present invention. The product 101 includes a PUF circuit 102 therein, and is designed to return a device-specific response 104 to the challenge 103 by using the PUF circuit 102. Here, “repetition processing” is considered in which a response string is generated by obtaining a response to a same challenge multiple times.
 一般に、PUFのレスポンスは、エラーを含むため、製品101からのレスポンスは、必ずしも毎回同じ値になるとは限らない。一例として、図1では、レスポンスを5回得る場合を示している。この例では、チャレンジ103としてAを5回与えた場合に、レスポンス104(レスポンス列に相当)として5回、値が返され、この内の4回が1で、1回が0となっている。 Generally, since the PUF response includes an error, the response from the product 101 does not always have the same value every time. As an example, FIG. 1 shows a case where responses are obtained five times. In this example, when A is given five times as the challenge 103, the value is returned five times as the response 104 (corresponding to the response string), four of which are 1 and 1 is 0. .
 このようにレスポンス列に含まれる結果が異なる場合には、5回の中で多数を占める1が、製品101に対してAを与えたときの正しいレスポンス(正規品レスポンスに相当するが、以下では、単に「レスポンス」と称す)であると解釈できる。また、5回中1回、誤ったレスポンス0が出力されているので、正規品に関するエラー率(正規品エラー率に相当するが、以下では、単に「エラー率」と称す)は、20%であると解釈できる。 In this way, when the results included in the response sequence are different, 1 that occupies the majority in the 5 times corresponds to a correct response when A is given to the product 101 (corresponding to a regular product response, Simply referred to as “response”). Also, since an incorrect response 0 is output once out of 5 times, the error rate related to the genuine product (corresponding to the regular product error rate, but is simply referred to as “error rate” below) is 20%. It can be interpreted as being.
 なお、繰り返し回数が5回と少ないため、エラー率が20%という粗い精度になっているが、実際には、繰り返し回数を任意に多く取ることで、正規品エラー率の精度を高めることができる。ここでは、説明を簡略化するために、以後も繰り返し回数は5回とする。 Since the number of repetitions is as small as 5, the error rate has a coarse accuracy of 20%. However, in practice, the accuracy of the regular product error rate can be increased by arbitrarily increasing the number of repetitions. . Here, in order to simplify the description, the number of repetitions is assumed to be 5 thereafter.
 こうして得られるレスポンスとエラー率を組み合わせることで、PUFのチャレンジ・レスポンスを模倣されても、なお正規品の認証を行うことができる。まず、製品の製造時に、各チャレンジに対するレスポンスとエラー率をデータベース105に登録する。例えば、データ106は、正規品1に関する情報を表しており、チャレンジAに対してはレスポンス1が、チャレンジBに対してはレスポンス0が、それぞれ返されるというチャレンジ・レスポンスの関係を表す情報と、エラー率が20%であるという統計情報を含んでいる。こうしたデータをデータベース105に登録しておく。 By combining the response and error rate obtained in this way, even if the PUF challenge / response is imitated, the authentic product can still be authenticated. First, the response to each challenge and the error rate are registered in the database 105 when the product is manufactured. For example, the data 106 represents information on the genuine product 1, information indicating a challenge-response relationship in which a response 1 is returned for the challenge A and a response 0 is returned for the challenge B; Statistical information that the error rate is 20% is included. Such data is registered in the database 105 in advance.
 エラー率は、個々のチャレンジ・レスポンスに対する個別のエラー率を利用することもできるし、全チャレンジ・レスポンスに対するエラー率の平均を利用することもできる。以後は、全チャレンジ・レスポンスに対するエラー率の平均を利用する想定で、説明を進める。 The error rate can use an individual error rate for each challenge / response or an average error rate for all challenge / responses. In the following, the explanation will be made on the assumption that the average error rate for all challenges and responses is used.
 製品の検証時には、あるチャレンジに対するレスポンスとエラー率の両方を検証する。例えば、製品107に対してチャレンジ108としてBを5回与えたとき、レスポンス109(レスポンス列に相当)として、4回の0と1回の1が得られたとする。この検証結果は、製品107にチャレンジBを与えたときのレスポンスが0でエラー率が20%であることを示している。そして、この検証結果と、データベース105にあらかじめ登録されている正規品のデータ106とを比較すると、両者が一致しているため、製品107が正規品1であることがわかる。 When verifying a product, verify both the response to a challenge and the error rate. For example, when B is given 5 times as a challenge 108 to the product 107, 4 times 0 and 1 time 1 are obtained as a response 109 (corresponding to a response string). This verification result indicates that the response when the challenge B is given to the product 107 is 0 and the error rate is 20%. When the verification result is compared with the genuine product data 106 registered in advance in the database 105, it can be seen that the product 107 is the genuine product 1 because they match.
 一方、模倣品110は、正規品1のPUFのチャレンジ・レスポンスを模倣したものであり、与えられたチャレンジ111に対して正しいレスポンスを返すことができるとする。したがって、チャレンジ111としてBを5回与えると、レスポンス112として正しい値0を5回返すこととなる。この検証結果は、模倣品110にチャレンジ111としてBを与えたときのレスポンス112(レスポンス列に相当)が0でエラー率が0%であることを示している。そして、この検証結果によるエラー率0%は、正規品1のデータ106のエラー率20%とは一致しないため、検証した製品が模倣品であることがわかる。 On the other hand, it is assumed that the counterfeit product 110 imitates the challenge response of the PUF of the regular product 1 and can return a correct response to the given challenge 111. Therefore, if B is given five times as the challenge 111, the correct value 0 is returned five times as the response 112. This verification result indicates that the response 112 (corresponding to the response string) when the imitation product 110 is given B as the challenge 111 is 0 and the error rate is 0%. Since the error rate of 0% based on the verification result does not match the error rate of 20% of the data 106 of the regular product 1, it can be seen that the verified product is a counterfeit product.
 図2は、本発明の実施の形態1における認証処理装置で繰り返し処理を実行するための回路構成図である。図2に示した回路(認証回路)201は、チャレンジレジスタ203、制御回路204、PUF回路205、およびレスポンス評価回路206を備えて構成されている。 FIG. 2 is a circuit configuration diagram for repeatedly executing processing by the authentication processing device according to Embodiment 1 of the present invention. The circuit (authentication circuit) 201 illustrated in FIG. 2 includes a challenge register 203, a control circuit 204, a PUF circuit 205, and a response evaluation circuit 206.
 そして、回路201は、チャレンジ202が入力されると、それに対するPUFのレスポンス生成を繰り返し行い、その結果として、レスポンス210、およびエラー率に関する統計情報215を出力するように構成されている。 Then, when the challenge 202 is input, the circuit 201 repeatedly generates a PUF response to the challenge 202, and as a result, outputs a response 210 and statistical information 215 regarding the error rate.
 全体の動作は、制御回路204によって制御されている。また、図1で説明したように、繰り返しの結果として出力するレスポンス210は、0/1のどちらが多く出たか、すなわち、多数決結果となるように構成されている。 The overall operation is controlled by the control circuit 204. In addition, as described with reference to FIG. 1, the response 210 output as a result of repetition is configured so that which of 0/1 is generated, that is, a majority decision result.
 202から入力されたチャレンジは、チャレンジレジスタ203に保持される。そして、チャレンジレジスタ203に保持された値がPUF回路205に入力されることにより、チャレンジに対するPUFのレスポンスが生成される。ここで、レスポンス生成は、制御回路204により、複数回繰り返し行われる。図2は、繰り返し回数を(2のN乗-1)とする場合の構成である。たとえば、N=3のとき、繰り返し回数は(2の3乗-1)=7である。 The challenge input from 202 is held in the challenge register 203. Then, the value held in the challenge register 203 is input to the PUF circuit 205, so that a PUF response to the challenge is generated. Here, the response generation is repeatedly performed a plurality of times by the control circuit 204. FIG. 2 shows a configuration when the number of repetitions is (2 to the Nth power-1). For example, when N = 3, the number of repetitions is (2 to the power of −1) = 7.
 このとき、レスポンス評価回路206によって、繰り返し処理の結果としての最終的なレスポンス210を決定する。そのために、Nビットカウンタ208で、(2のN乗-1)回の繰り返しにおける0と1の回数を数える。具体的には、まず、Nビットカウンタ208を0で初期化し、その後PUF回路205でレスポンス生成を行うたびに、そのレスポンス値を、加算器207を用いてカウンタ208の現在値に加算し、その結果を新たにカウンタ208の値として保持するようにする。 At this time, the response evaluation circuit 206 determines a final response 210 as a result of the iterative processing. For this purpose, the N-bit counter 208 counts the number of 0s and 1s in (2 N-1) iterations. Specifically, first, the N-bit counter 208 is initialized with 0, and each time a response is generated by the PUF circuit 205, the response value is added to the current value of the counter 208 using the adder 207. The result is newly held as the value of the counter 208.
 その結果、(2のN乗-1)回のレスポンスが全て0だった場合には、Nビットカウンタ208の値は0となり、レスポンスに1が含まれる回数に従ってカウンタ208の値は増え、全て1だった場合には、カウンタ208の値は(2のN乗-1)となる。このとき、Nビットカウンタ208の最上位ビットが、レスポンス生成の繰り返しにおける0/1の多数決結果となっている。 As a result, when the responses of (2 to the power of N-1) are all 0, the value of the N-bit counter 208 is 0, and the value of the counter 208 increases according to the number of times that 1 is included in the response. If so, the value of the counter 208 is (2 to the power of N-1). At this time, the most significant bit of the N-bit counter 208 is a 0/1 majority result in response generation repetition.
 具体的には、たとえば、N=3のとき、Nビットカウンタ208の値が2進数表記で100、101、110、111(10進数で4~7に相当)であれば1が多数であったことを表し、000、001、010、011(10進数で0~3に相当)であれば0が多数であったことを表すが、その多数決結果は、最上位ビットに現れている。したがって、レスポンス評価回路206は、Nビットカウンタ208の最上位ビットの値をレスポンスレジスタ209に保持し、これを最終的なレスポンス210として出力する。 Specifically, for example, when N = 3, if the value of the N-bit counter 208 is 100, 101, 110, or 111 (equivalent to 4 to 7 in decimal) in binary notation, there are many 1s. 000, 001, 010, 011 (corresponding to 0 to 3 in decimal) indicates that there are many 0s, but the majority result appears in the most significant bit. Therefore, the response evaluation circuit 206 holds the value of the most significant bit of the N-bit counter 208 in the response register 209 and outputs this as the final response 210.
 また、このとき、制御回路204は、Nビットカウンタ208の値を評価し、エラー率に関する統計情報215を出力する。制御回路204内のエラー回数評価回路211は、カウンタ値からエラーの回数を求めて出力する回路であり、カウンタ値212を、00・・・0(all 0)または11・・・1(all 1)で示されるデータ213とXORし、エラー回数レジスタ214に保持する。なお、データ213の値は、カウンタ値の最上位ビットが0のとき00・・・0とし、1のとき11・・・1とする。 At this time, the control circuit 204 evaluates the value of the N-bit counter 208 and outputs statistical information 215 regarding the error rate. The error number evaluation circuit 211 in the control circuit 204 is a circuit that obtains and outputs the number of errors from the counter value, and sets the counter value 212 to 00 ... 0 (all 0) or 11 ... 1 (all 1). XOR the data 213 indicated by () and hold it in the error count register 214. The value of the data 213 is 00... 0 when the most significant bit of the counter value is 0, and 11.
 このようにして得られるエラー回数レジスタ214の値は、(2のN乗-1)回のレスポンス生成におけるエラーの回数となっている。具体的には、たとえば、N=3でカウンタ値212が2進数表記で101(10進数で5に相当)であれば、エラー回数レジスタの値は、101と111のXOR結果である010(10進数で2に相当)となり、7回のレスポンス生成においてエラーが2回であったことを表していることとなる。 The value of the error number register 214 obtained in this way is the number of errors in the response generation of (2 N-1) times. Specifically, for example, if N = 3 and the counter value 212 is 101 in binary notation (corresponding to 5 in decimal), the value of the error count register is the XOR result of 101 and 111 010 (10 This is equivalent to 2 in decimal), and represents that the error was 2 times in 7 response generations.
 図3は、本発明の実施の形態1における図2の構成を備えた認証処理装置で実行される一連の繰り返し処理に関するフローチャートである。以下、それぞれのステップに従って、一連処理の流れを説明する。 FIG. 3 is a flowchart relating to a series of repetitive processes executed by the authentication processing apparatus having the configuration of FIG. 2 in the first embodiment of the present invention. Hereinafter, the flow of a series of processes will be described according to each step.
 まず始めに、ステップS301において、回路201にチャレンジ202を入力する。次に、ステップS302において、ステップS303~ステップS305の処理をN回繰り返し行うためのループを開始する。 First, the challenge 202 is input to the circuit 201 in step S301. Next, in step S302, a loop for repeating the processes of steps S303 to S305 N times is started.
 そして、S303において、先のステップS301で入力されたチャレンジ202に対するPUF回路205のレスポンスを生成する。次に、ステップS304において、先のステップS303で生成したPUF回路205のレスポンスの値に応じて、処理を分ける。具体的には、値が0であればステップS306に進み、値が1であればステップS305に進む。 In S303, a response of the PUF circuit 205 to the challenge 202 input in the previous step S301 is generated. Next, in step S304, the processing is divided according to the response value of the PUF circuit 205 generated in the previous step S303. Specifically, if the value is 0, the process proceeds to step S306, and if the value is 1, the process proceeds to step S305.
 ステップS305に進んだ場合には、Nビットカウンタ208の値を1増加させる。そして、ステップS306において、上述したステップS303~ステップS305の一連処理を繰り返し行い、N回繰り返すことでループを終了する。 When the process proceeds to step S305, the value of the N-bit counter 208 is incremented by one. In step S306, the series of processes in steps S303 to S305 described above are repeated, and the loop is terminated by repeating N times.
 次に、ステップS307において、レスポンス評価回路206内のレスポンスレジスタ209は、N回繰り返しのループで求めたNビットカウンタ208のカウンタ値から、最終的なレスポンス210を求める。 Next, in step S307, the response register 209 in the response evaluation circuit 206 obtains a final response 210 from the counter value of the N-bit counter 208 obtained in a loop of N times.
 また、ステップS308において、制御回路204内のエラー回数評価回路211は、N回繰り返しのループで求めたNビットカウンタ208のカウンタ値から、エラー回数215を求める。 In step S308, the error count evaluation circuit 211 in the control circuit 204 calculates the error count 215 from the counter value of the N-bit counter 208 determined in a loop of N times.
 そして、レスポンス評価回路206は、ステップS309において、先のステップS307で求めたレスポンス210を回路201から出力する。さらに、制御回路204は、ステップS310において、先のステップS308で求めたエラー回数215を回路201から出力する。 Then, the response evaluation circuit 206 outputs the response 210 obtained in the previous step S307 from the circuit 201 in step S309. Further, in step S310, the control circuit 204 outputs the number of errors 215 obtained in the previous step S308 from the circuit 201.
 そして、ステップS311において、登録処理、あるいは検証処理に分けて、その後の処理を行う。具体的には、処理結果をデータベース105へ登録する場合には、ステップS312に進み、処理結果による検証を行う場合には、S313に進む。 Then, in step S311, the subsequent processing is performed by dividing into registration processing or verification processing. Specifically, when the processing result is registered in the database 105, the process proceeds to step S312. When the verification based on the processing result is performed, the process proceeds to S313.
 ステップS312に進んだ場合には、先のS309で回路201から出力されたレスポンス210と、先のステップS310で回路201から出力されたエラー回数215をデータベース105に登録し、一連処理を終了する。 When the process proceeds to step S312, the response 210 output from the circuit 201 in the previous step S309 and the error count 215 output from the circuit 201 in the previous step S310 are registered in the database 105, and the series of processes ends.
 一方、ステップS313に進んだ場合には、先のS309で回路201から出力されたレスポンス210、および先のステップS310で回路201から出力されたエラー回数215と、既にデータベース105に登録されている正規品の値とを照合し、レスポンス210あるいはエラー回数215の少なくとも1つが不一致の場合には、模倣品であると判断し、一連処理を終了する。 On the other hand, when the process proceeds to step S313, the response 210 output from the circuit 201 in the previous S309, the error count 215 output from the circuit 201 in the previous step S310, and the regularity already registered in the database 105 are obtained. If at least one of the response 210 or the number of errors 215 does not match, it is determined that the product is a counterfeit product, and the series of processes ends.
 以上のように、実施の形態1によれば、PUFのチャレンジ・レスポンスが模倣された場合であっても、PUFのレスポンスに関する統計情報(繰り返し処理に対するエラー回数あるいはエラー率に相当)が正規品データと一致するかを検証することで、なお模倣品を検出することができる認証方式、および、そのための回路が実現される。 As described above, according to the first embodiment, even when the PUF challenge / response is imitated, the statistical information (corresponding to the number of errors or error rate for repeated processing) of the PUF response is the genuine data. By verifying whether they match, an authentication method that can still detect a counterfeit and a circuit therefor are realized.
 なお、エラー率に関しては、正確に一致する以外にも、認証対象品に対して算出されたエラー率が、正規品データのエラー率を含む許容範囲内に入っていることで、正規品であると判断することができる。 Regarding the error rate, in addition to the exact match, the error rate calculated for the product to be certified is within the allowable range including the error rate of the regular product data, so it is a genuine product. It can be judged.
 実施の形態2.
 先の実施の形態1においては、同一のチャレンジを繰り返し用いてレスポンス列を生成し、検証処理を行う場合について説明した。これに対して、本実施の形態2では、異なるチャレンジを用いてレスポンス列を生成し、検証処理を行う場合について説明する。
Embodiment 2. FIG.
In the first embodiment, the case has been described in which a response string is generated by repeatedly using the same challenge and the verification process is performed. On the other hand, in the second embodiment, a case where a response sequence is generated using different challenges and a verification process is performed will be described.
 図4は、本発明の実施の形態2における検証処理の説明図である。具体的には、同一のチャレンジを繰り返し用いる先の実施の形態1の検証処理と対比して、異なるチャレンジを用いる本実施の形態2の検証処理を示している。なお、本実施の形態2における製造時に行うデータベースの登録に関しては、先の実施の形態1と同様にして行う。 FIG. 4 is an explanatory diagram of the verification process according to the second embodiment of the present invention. Specifically, the verification process of the second embodiment using a different challenge is shown in contrast to the verification process of the first embodiment that repeatedly uses the same challenge. Note that database registration at the time of manufacturing in the second embodiment is performed in the same manner as in the first embodiment.
 図4の上段に示した検証処理401は、先の実施の形態1と同様の、同一チャレンジを用いる検証処理を表している。検証対象品である正規品402に対し、同一のチャレンジ403が入力され、レスポンス404(レスポンス列に相当)が出力されている。認証者は、データベース105から取得した正規品のレスポンスの繰り返しからなるデータ405と、正規品402に対する実際のレスポンス404とを照合することにより、5個中4個のレスポンスが正しいこと、また、その結果エラー率が20%であることを確認することができ、検証対象品が正規品402であることを確認することができる。 The verification process 401 shown in the upper part of FIG. 4 represents the verification process using the same challenge as in the first embodiment. The same challenge 403 is input to the genuine product 402 that is the verification target product, and a response 404 (corresponding to a response string) is output. The authenticator collates the data 405 consisting of repeated responses of the genuine product acquired from the database 105 with the actual response 404 for the genuine product 402 to confirm that four of the five responses are correct, and that The result error rate can be confirmed to be 20%, and the verification target product can be confirmed to be the regular product 402.
 ただし、この方式では、同一チャレンジに対するレスポンスを複数回出力しているため、レスポンス404を盗聴すればエラー率を推測できてしまう。すなわち、同一のチャレンジBを5回入力した結果、値0が4回、値1が1回出力されていることから、値1が誤りでエラー率が20%であることを推測できてしまう。したがって、たとえばソフトウェアによる疑似乱数生成を利用して確率的にエラーを発生させるなど、エラー率をも模倣した模倣品を許す可能性がある。 However, in this method, since a response to the same challenge is output a plurality of times, an error rate can be estimated if the response 404 is wiretapped. That is, as a result of inputting the same challenge B five times, the value 0 is output four times and the value 1 is output once. Therefore, it can be estimated that the value 1 is incorrect and the error rate is 20%. Therefore, there is a possibility that a counterfeit product that also imitates the error rate is allowed, for example, an error is generated stochastically using pseudorandom number generation by software.
 一方、図4の下段に示した検証処理406は、本実施の形態2による異なるチャレンジを用いる検証処理を表している。検証対象品である正規品407に対し、異なるチャレンジ408が入力され、レスポンス409(レスポンス列に相当)が出力されている。認証者は、データベース105から取得した、それぞれのチャレンジに対する正規品のレスポンス409からなるデータ410と、正規品407に対する実際のレスポンス409とを照合することにより、5個中4個のレスポンスが正しいこと、また、その結果エラー率が20%であることを確認することができ、検証対象品が正規品407であることを確認することができる。 On the other hand, a verification process 406 shown in the lower part of FIG. 4 represents a verification process using different challenges according to the second embodiment. A different challenge 408 is input to the regular product 407 that is the verification target product, and a response 409 (corresponding to a response string) is output. The authenticator collates the data 410, which is obtained from the database 105 and includes the genuine response 409 for each challenge, and the actual response 409 for the genuine product 407, so that four responses out of five are correct. As a result, it can be confirmed that the error rate is 20%, and the verification target product can be confirmed to be a regular product 407.
 本実施の形態2による検証方式では、異なる各チャレンジA~Eに対するレスポンスが1回しか出力されていない。このため、レスポンス409を盗聴しただけでは、どのチャレンジに対するレスポンスが正しく、どのチャレンジに対するレスポンスが誤りであるかを判別することができず、エラー率を推測することができない。したがって、エラー率の模倣を防ぐことができる。 In the verification method according to the second embodiment, responses to different challenges A to E are output only once. For this reason, just by eavesdropping on the response 409, it is not possible to determine which response to which challenge is correct and to which challenge the response is incorrect, and the error rate cannot be estimated. Therefore, imitation of the error rate can be prevented.
 図5は、本発明の実施の形態2における認証処理装置で、異なるチャレンジを用いる検証処理406を実行するための回路構成図である。図5に示した回路(認証回路)501は、制御回路504、セレクタ505、チャレンジレジスタ506、加算器507、PUF回路508、およびレスポンスレジスタ509を備えて構成されている。 FIG. 5 is a circuit configuration diagram for executing verification processing 406 using different challenges in the authentication processing apparatus according to Embodiment 2 of the present invention. The circuit (authentication circuit) 501 illustrated in FIG. 5 includes a control circuit 504, a selector 505, a challenge register 506, an adder 507, a PUF circuit 508, and a response register 509.
 そして、回路501は、チャレンジ502が入力されると、チャレンジ502の値を起点として異なるチャレンジの増加列を生成し、それぞれの異なるチャレンジに対するレスポンス503を順次出力する。 Then, when the challenge 502 is input, the circuit 501 generates an increasing sequence of different challenges starting from the value of the challenge 502, and sequentially outputs responses 503 for the different challenges.
 回路全体は、制御回路504によって制御されている。大きく分けて、チャレンジレジスタ506、PUF回路508、レスポンスレジスタ509からなる単純な構成で、与えられたチャレンジ502に対するPUF回路508のレスポンスを生成する回路である。ただし、チャレンジレジスタ506の前段にセレクタ505を設けることで、チャレンジレジスタ506の値を変化させられるようにしている。 The entire circuit is controlled by the control circuit 504. The circuit is roughly divided into a challenge register 506, a PUF circuit 508, and a response register 509, and is a circuit that generates a response of the PUF circuit 508 with respect to a given challenge 502. However, by providing a selector 505 in front of the challenge register 506, the value of the challenge register 506 can be changed.
 この構成により、チャレンジ502が入力される時にはセレクタ505でこのチャレンジが選択され、このチャレンジに対応するレスポンスがPUF回路508によって生成され、レスポンスレジスタ509に保持される。その後、加算器507によって、チャレンジに1が加算された値がセレクタ505で選択され、それに対応するレスポンスがPUF回路508によって生成され、レスポンスレジスタ509に保持される。 With this configuration, when a challenge 502 is input, this challenge is selected by the selector 505, and a response corresponding to this challenge is generated by the PUF circuit 508 and held in the response register 509. Thereafter, a value obtained by adding 1 to the challenge is selected by the selector 505 by the adder 507, and a response corresponding to the value is generated by the PUF circuit 508 and held in the response register 509.
 以下、同様にして、次々とチャレンジの値に1が加算され、それに対応するレスポンスが生成され、レスポンスレジスタに保持される。このようにして、初めに入力されたチャレンジ502の値を起点とするチャレンジの増加列に対して、PUF回路508のレスポンスが次々と生成され、異なるチャレンジのそれぞれに対するレスポンス503が次々と出力されていく。 Hereinafter, similarly, 1 is added to the value of the challenge one after another, and a response corresponding to the value is generated and held in the response register. In this way, responses of the PUF circuit 508 are generated one after another with respect to an increasing sequence of challenges starting from the value of the challenge 502 input first, and responses 503 corresponding to the different challenges are output one after another. Go.
 なお、回路501では、加算器507によってチャレンジの値を1ずつ増加させているが、チャレンジを変化させる方法は、この方法に限らない。たとえば、線形帰還シフトレジスタを用いて値を変化させていく構成でもよい。 In the circuit 501, the adder 507 increments the challenge value by 1. However, the method for changing the challenge is not limited to this method. For example, a configuration in which a value is changed using a linear feedback shift register may be used.
 また、説明を簡単にするため、回路501は、エラー率を求めるための回路を内部に持たない構成として示しているが、先の実施の形態1における図2の回路201と同様に、エラー率を求めるためのエラー回数評価回路211を内部に持つ構成にしてもよい。 Further, for simplicity of description, the circuit 501 is shown as a configuration that does not have a circuit for obtaining an error rate therein, but the error rate is similar to the circuit 201 of FIG. 2 in the first embodiment. An error number evaluation circuit 211 for obtaining the above may be included.
 図6は、本発明の実施の形態2における図5の構成を備えた認証処理装置で実行される一連の繰り返し処理に関するフローチャートである。以下、それぞれのステップに従って、一連処理の流れを説明する。 FIG. 6 is a flowchart relating to a series of repetitive processes executed by the authentication processing apparatus having the configuration of FIG. 5 in the second embodiment of the present invention. Hereinafter, the flow of a series of processes will be described according to each step.
 まず始めに、S601において、登録処理、あるいは検証処理に分けて、その後の処理を行う。具体的には、処理結果をデータベース105へ登録する場合には、ステップS602に進み、処理結果による検証を行う場合には、S609に進む。 First, in S601, the registration process or the verification process is divided into subsequent processes. Specifically, if the processing result is registered in the database 105, the process proceeds to step S602, and if verification based on the processing result is performed, the process proceeds to S609.
 データベースへの登録を行うためにステップS602に進んだ場合には、以降のステップS603~ステップS605の処理をM回繰り返すループを開始する。 When the process proceeds to step S602 for registration in the database, a loop that repeats the subsequent steps S603 to S605 M times is started.
そして、S603において、回路501にチャレンジ502を入力する。次に、ステップS604において、先のステップS603で入力されたチャレンジ502に対するPUF回路508のレスポンスを生成する。次に、ステップS605において、ステップS604で生成したレスポンスを出力する。そして、ステップS606において、上述したステップS603~ステップS605の一連処理をM回繰り返し行い、ループを終了する。 In step S <b> 603, the challenge 502 is input to the circuit 501. Next, in step S604, a response of the PUF circuit 508 to the challenge 502 input in the previous step S603 is generated. Next, in step S605, the response generated in step S604 is output. In step S606, the series of processes in steps S603 to S605 described above is repeated M times, and the loop is terminated.
 次に、ステップS607において、M回繰り返しのループで得られた、同一チャレンジに対するM個のPUFレスポンスから、最終的なレスポンスとエラー率を計算する。そして、ステップS608において、先のステップS607で得られたレスポンスとエラー率を、データベース105に登録し、一連処理を終了する。 Next, in step S607, a final response and an error rate are calculated from the M PUF responses for the same challenge obtained in a loop of M times. In step S608, the response and error rate obtained in the previous step S607 are registered in the database 105, and the series of processes ends.
 なお、これらのステップS602~ステップS609の一連処理によって得られるレスポンスは、1つのチャレンジに対するものであり、異なるチャレンジに対しては、これらの一連処理を個別に実施することで、データベースを構築することとなる。まら、エラー率は、異なるチャレンジのそれぞれで得られたエラー率の平均として算出することができる。 Note that the response obtained by the series of steps S602 to S609 is for one challenge, and for different challenges, the database is constructed by individually performing these series of processes. It becomes. Of course, the error rate can be calculated as the average of the error rates obtained for each of the different challenges.
 一方、処理結果による検証を行うために、S609に進んだ場合には、回路501にチャレンジ502を入力する。次に、ステップS610において、以降のステップS611~ステップS613の処理をN回繰り返すループを開始する。 On the other hand, when the processing proceeds to S609 in order to perform verification based on the processing result, the challenge 502 is input to the circuit 501. Next, in step S610, a loop is started in which the processes in subsequent steps S611 to S613 are repeated N times.
 そして、ステップS611において、先のステップS609で入力されたチャレンジ502に対するPUF回路508のレスポンスを生成する。次に、ステップS612において、ステップS611で生成したレスポンスを出力する。次に、ステップS613において、加算器507により、チャレンジの値を1増加させる。そして、ステップS614において、上述したステップS611~S613の一連処理をN回繰り返し行い、ループを終了する。 In step S611, a response of the PUF circuit 508 to the challenge 502 input in the previous step S609 is generated. Next, in step S612, the response generated in step S611 is output. In step S613, the adder 507 increments the challenge value by one. In step S614, the series of processes in steps S611 to S613 described above is repeated N times, and the loop is terminated.
 次に、ステップS615において、N回繰り返しのループで得られた、N個の異なるチャレンジに対するPUF回路508のレスポンス列と、既にデータベース105に登録されている正規品の値に基づくレスポンス列とを照合すし、正規品か模倣品かの判断を行うこととなる。 Next, in step S615, the response sequence of the PUF circuit 508 for N different challenges obtained in a loop of N iterations is compared with the response sequence based on the value of the genuine product already registered in the database 105. However, it will be judged whether the product is genuine or counterfeit.
 なお、異なるチャレンジに対する、検証で得られたレスポンス列と、あらかじめ取得した正規品のレスポンス列途の比較において、あるチャレンジに対するエラーが発生した場にも、エラー率を考慮することで、正規品か否かを識別することが可能となる。 In addition, in the case where an error occurs for a challenge in the comparison of the response sequence obtained by verification for a different challenge and the response sequence of a genuine product acquired in advance, the error rate is also taken into consideration to determine whether the product is a genuine product. It is possible to identify whether or not.
 以上のように、実施の形態2によれば、同一のチャレンジを繰り返し使用する代わりに、異なるチャレンジに対するレスポンス結果に基づいて正規品か否かを判断することで、エラー率の模倣も防ぐことができ、より確実に模倣品を検出することができる認証方式、および、そのための回路が実現される。 As described above, according to the second embodiment, instead of repeatedly using the same challenge, it is possible to prevent imitation of an error rate by determining whether the product is a genuine product based on a response result to a different challenge. An authentication method capable of detecting a counterfeit product more reliably and a circuit therefor are realized.

Claims (6)

  1.  半導体デバイスの物理的な特徴量に基づき、各チャレンジ入力に対し個々の半導体デバイスに固有の情報であるレスポンスを出力するように設計されたPUF回路を利用して、前記固有の情報である前記レスポンスに基づいて認証対象品である前記半導体デバイスが正規品であるか否かの認証処理を行う認証回路を備えた認証処理装置であって、
     前記認証回路は、正規品におけるチャレンジ入力に対する正規品レスポンスとともに、前記正規品に対してチャレンジ入力をN(Nは2以上の整数)回繰り返したときに前記正規品レスポンスが得られない割合を正規品エラー率としてあらかじめデータベースに記憶しておき、前記認証対象品に対する認証を行う際には、チャレンジをN回繰り返してN個のレスポンスからなるレスポンス列を生成し、生成した前記レスポンス列に対して、前記データベースに登録されている前記正規品レスポンスに基づいて前記認証対象品のエラー率を算出し、算出した前記認証対象品のエラー率が、前記データベースに登録されている前記正規品エラー率を含む許容範囲内にある場合には、前記認証対象品が正規品であると判断する
     認証処理装置。
    The response, which is the unique information, using a PUF circuit designed to output a response, which is information unique to each semiconductor device, for each challenge input based on a physical feature quantity of the semiconductor device An authentication processing apparatus including an authentication circuit for performing an authentication process as to whether or not the semiconductor device as a product to be authenticated is a genuine product based on
    The authentication circuit authenticates the ratio that the authentic response cannot be obtained when the challenge input is repeated N times (N is an integer of 2 or more) for the authentic product, along with the authentic response to the challenge input in the authentic product. The product error rate is stored in the database in advance, and when authenticating the product to be authenticated, a challenge is repeated N times to generate a response string composed of N responses, and the generated response string The error rate of the product to be authenticated is calculated based on the genuine product response registered in the database, and the calculated error rate of the product to be authenticated is the error rate of the genuine product registered in the database. An authentication processing device that determines that the product to be authenticated is a genuine product if it is within an allowable range.
  2.  請求項1に記載の認証処理装置において、
     前記認証回路は、前記認証対象品に対する認証を行う際に、同一のチャレンジ入力をN回繰り返すことで前記レスポンス列を生成し、前記同一のチャレンジ入力に対する前記エラー率に基づいて前記認証処理を行う
     認証処理装置。
    The authentication processing device according to claim 1,
    The authentication circuit generates the response string by repeating the same challenge input N times when authenticating the product to be authenticated, and performs the authentication process based on the error rate for the same challenge input Authentication processing device.
  3.  請求項2に記載の認証処理装置において、
     前記認証回路は、
      前記正規品における同一のチャレンジ入力に対する複数回のレスポンスでの多数決結果により、前記正規品レスポンスを特定するレスポンス評価回路と、
      前記多数決結果により前記正規品レスポンスを特定した際に、前記複数回のレスポンスの中で前記正規品レスポンスが得られた割合を前記正規品エラー率として特定するエラー回数評価回路と
     を備える認証処理装置。
    The authentication processing device according to claim 2,
    The authentication circuit includes:
    A response evaluation circuit that identifies the genuine response by a majority result in a plurality of responses to the same challenge input in the genuine product,
    An authentication processing device comprising: an error number evaluation circuit that specifies a ratio of the regular product response obtained in the plurality of responses as the regular product error rate when the regular product response is identified by the majority result. .
  4.  請求項1に記載の認証処理装置において、
     前記認証回路は、複数の異なるN個のチャレンジ入力のそれぞれに対して、前記正規品レスポンスをあらかじめ前記データベースに記憶しておくとともに、前記正規品に対して前記N個のチャレンジ入力をそれぞれM(Mは2以上の整数)回繰り返したときに、合計M×N回の認証処理において前記正規品レスポンスが得られない割合を正規品エラー率として前記データベースにあらかじめ記憶しておき、前記認証対象品に対する認証を行う際に、N個の異なるチャレンジ入力に対するレスポンスから前記レスポンス列を生成し、生成した前記レスポンス列に対して、前記N個の異なるチャレンジのそれぞれに対応して前記データベースに登録されている前記正規品レスポンスに基づいて前記認証対象品のエラー率を算出し、算出した前記認証対象品のエラー率が、前記データベースに登録されている前記正規品エラー率を含む許容範囲内にある場合には、前記認証対象品が正規品であると判断する
     認証処理装置。
    The authentication processing device according to claim 1,
    The authentication circuit stores the genuine product response in the database in advance for each of a plurality of different N challenge inputs, and M (( When M is an integer greater than or equal to 2 times, the ratio that the genuine product response is not obtained in a total of M × N authentication processes is stored in the database in advance as a regular product error rate, and the product to be certified When the authentication is performed, the response sequence is generated from responses to N different challenge inputs, and the generated response sequence is registered in the database corresponding to each of the N different challenges. The error rate of the product to be authenticated is calculated based on the genuine product response, and the calculated authentication Error rate of the target products, if within the allowable range including the genuine error rate registered in the database, the authentication processing unit, wherein the authentication object article is determined to be genuine.
  5.  請求項4に記載の認証処理装置において、
     前記認証回路は、
      前記正規品における基準となるチャレンジ入力を取得するとともに、前記基準となるチャレンジ入力を加算器を用いて1ずつ増加させることで前記複数の異なるN個のチャレンジ入力を生成し、前記N個のチャレンジ入力のそれぞれに対する複数回のレスポンスでの多数決結果により、前記N個のチャレンジ入力ごとに個別に前記正規品レスポンスを特定するレスポンス評価回路
     を備える認証処理装置。
    The authentication processing device according to claim 4,
    The authentication circuit includes:
    The challenge input as a reference in the genuine product is acquired, and the challenge input as the reference is incremented by 1 using an adder to generate the N different challenge inputs, and the N challenge inputs An authentication processing apparatus comprising: a response evaluation circuit that individually identifies the genuine product response for each of the N challenge inputs based on a majority decision result of a plurality of responses to each of the inputs.
  6.  半導体デバイスの物理的な特徴量に基づき、各チャレンジ入力に対し個々の半導体デバイスに固有の情報であるレスポンスを出力するように設計されたPUF回路を利用して、前記固有の情報である前記レスポンスに基づいて認証対象品である前記半導体デバイスが正規品であるか否かの認証処理を行う認証回路を備えた認証処理装置における認証処理方法であって、
     前記認証回路において、
      正規品におけるチャレンジ入力に対する正規品レスポンスとともに、前記正規品に対してチャレンジ入力をN(Nは2以上の整数)回繰り返したときに前記正規品レスポンスが得られない割合を正規品エラー率としてあらかじめデータベースに記憶しておく登録ステップと、
      前記認証対象品に対する認証を行う際に、チャレンジをN回繰り返してN個のレスポンスからなるレスポンス列を生成し、生成した前記レスポンス列に対して、前記データベースに登録されている前記正規品レスポンスに基づいて前記認証対象品のエラー率を算出し、算出した前記認証対象品のエラー率が、前記データベースに登録されている前記正規品エラー率を含む許容範囲内にある場合には、前記認証対象品が正規品であると判断する検証ステップと
     を備える認証処理方法。
    The response, which is the unique information, using a PUF circuit designed to output a response, which is information unique to each semiconductor device, for each challenge input based on a physical feature quantity of the semiconductor device An authentication processing method in an authentication processing apparatus including an authentication circuit that performs an authentication process as to whether or not the semiconductor device that is an authentication target product is a genuine product based on:
    In the authentication circuit,
    Along with the regular product response to the challenge input in the regular product, the percentage that the regular product response is not obtained when the challenge input is repeated N (N is an integer of 2 or more) times for the regular product in advance as the regular product error rate. A registration step stored in the database;
    When authenticating the product to be authenticated, the challenge is repeated N times to generate a response string composed of N responses, and the generated response string is added to the genuine product response registered in the database. And calculating the error rate of the product to be authenticated based on the error rate of the product to be authenticated is within an allowable range including the genuine product error rate registered in the database. An authentication processing method comprising: a verification step of determining that the product is genuine.
PCT/JP2013/064747 2013-05-28 2013-05-28 Authentication processing device and authentication processing method WO2014192077A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/JP2013/064747 WO2014192077A1 (en) 2013-05-28 2013-05-28 Authentication processing device and authentication processing method
TW102136281A TW201445349A (en) 2013-05-28 2013-10-08 Authentication processing device and authentication processing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2013/064747 WO2014192077A1 (en) 2013-05-28 2013-05-28 Authentication processing device and authentication processing method

Publications (1)

Publication Number Publication Date
WO2014192077A1 true WO2014192077A1 (en) 2014-12-04

Family

ID=51988153

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2013/064747 WO2014192077A1 (en) 2013-05-28 2013-05-28 Authentication processing device and authentication processing method

Country Status (2)

Country Link
TW (1) TW201445349A (en)
WO (1) WO2014192077A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111756541A (en) * 2019-03-26 2020-10-09 北京普安信科技有限公司 Method, server, terminal and system for transmitting secret key

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003090259A2 (en) * 2002-04-16 2003-10-30 Massachusetts Institute Of Technology Authentication of integrated circuits
WO2011118548A1 (en) * 2010-03-24 2011-09-29 独立行政法人産業技術総合研究所 Authentication processing method and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003090259A2 (en) * 2002-04-16 2003-10-30 Massachusetts Institute Of Technology Authentication of integrated circuits
WO2011118548A1 (en) * 2010-03-24 2011-09-29 独立行政法人産業技術総合研究所 Authentication processing method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
GHAITH HAMMOURI ET AL.: "PUF-HB: A Tamper-Resilient HB Based Authentication Protocol", LECTURE NOTES IN COMPUTER SCIENCE, vol. 5037, June 2008 (2008-06-01), pages 346 - 365 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111756541A (en) * 2019-03-26 2020-10-09 北京普安信科技有限公司 Method, server, terminal and system for transmitting secret key

Also Published As

Publication number Publication date
TW201445349A (en) 2014-12-01

Similar Documents

Publication Publication Date Title
Hospodar et al. Machine learning attacks on 65nm Arbiter PUFs: Accurate modeling poses strict bounds on usability
US9292665B2 (en) Secure serial number
JP6285536B2 (en) System and method for encrypting data
US11243744B2 (en) Method for performing a trustworthiness test on a random number generator
CN107924645A (en) There is the unclonable encryption device of physics
CN100356351C (en) System and method for code authentication
GB2507988A (en) Authentication method using physical unclonable functions
CN104424428B (en) For monitoring the electronic circuit and method of data processing
CN102347837A (en) Method for generating a challenge-response pair in an electric machine, and electric machine
CN106030605B (en) Digital value processing device and method
CN104753667A (en) A circuit unit for providing a cryptographic key
CN105049175A (en) Derivation of a device-specific value
CN104836808B (en) Based on the SM2 signature algorithm security verification methods for improving difference fault analysis
CN110022214A (en) For providing the system and method for safety in computer systems
CN103559454B (en) Data protection system and method
CN110071805B (en) Authentication method and circuit
US20230254136A1 (en) Apparatus and methods for validating user data
Ruhrmair Sok: Towards secret-free security
JP6372295B2 (en) Physical random number generation circuit quality test method, random number generator and electronic device
US20240163115A1 (en) Communication devices for use in challenge-response rounds and corresponding operating methods
WO2014192077A1 (en) Authentication processing device and authentication processing method
US9177123B1 (en) Detecting illegitimate code generators
CN114095182B (en) Dynamic response and security authentication method and system based on strong PUF
JP2021528925A (en) Correlated robust authentication technology that uses only helper data
CN115333824A (en) Encryption method, device, equipment and storage medium for resisting error injection attack

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13885549

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13885549

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: JP