Advanced Search
Volume 38 Issue 9
Sep.  2016
Turn off MathJax
Article Contents
ZHANG Yuejun, WANG Pengjun, LI Gang, QIAN Haoyu. Design of Glitch Physical Unclonable Functions Circuit Based on Signal Transmission Theory[J]. Journal of Electronics & Information Technology, 2016, 38(9): 2391-2396. doi: 10.11999/JEIT151312
Citation: ZHANG Yuejun, WANG Pengjun, LI Gang, QIAN Haoyu. Design of Glitch Physical Unclonable Functions Circuit Based on Signal Transmission Theory[J]. Journal of Electronics & Information Technology, 2016, 38(9): 2391-2396. doi: 10.11999/JEIT151312

Design of Glitch Physical Unclonable Functions Circuit Based on Signal Transmission Theory

doi: 10.11999/JEIT151312
Funds:

The Zhejiang Provincial Natural Science Foundation of China (LQ14F040001), The National Natural Science Foundation of China (61404076, 61474068, 61274132), The ST Plan of Zhejiang Provincial Science and Technology Department (2015C31010)

  • Received Date: 2015-11-25
  • Rev Recd Date: 2016-04-27
  • Publish Date: 2016-09-19
  • In this paper, a Glitch-PUF circuit technique is proposed by taking into consideration various aspects i.e. the signal transmission theory, race and hazard phenomenon, and Physical Unclonable Functions (PUF). First and foremost, the glitch circuit is obtained under the signal transmission theory. Using the combinational logic circuit propagation delay difference which causes 1-hazard and 0-hazard, this feature is used to form output glitch waveform. This glitch is sampled by multistage delay sampling circuit. Due to the nonlinear characteristics of the Glitch, Glitch-PUF can thwart the modeling attack. Finally, under the TSMC 65 nm CMOS technology, a 128-bit output data Glitch-PUF circuit is designed. Monte Carlo simulation results show that the Glitch PUF circuit has better randomness.
  • loading
  • PAPPU R, RECHT B, TAYLOR J, et al. Physical one-way functions[J]. Science, 2002, 297(5589): 2026-2030.
    LIM D, LEE J W, GASSEND B, et al. Extracting secret keys from integrated circuits[J]. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2005, 13(10): 1200-1205.
    LAO Y J and PARHI K K. Statistical analysis of MUX-based physical unclonable functions[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2014, 33(5): 649-662.
    CAO Yuan, ZHANG Le, CHANG Chiphong, et al. A low- power hybrid RO PUF with improved thermal stability for lightweight applications[J]. IEEE Transactions on Computer- Aided Design of Integrated Circuits and Systems, 2015, 34(7): 1143-1147.
    WIECZOREK P Z and GOLOFIT K. Metastability occurrence based physical unclonable functions for FPGAs[J]. Electronics Letters, 2014, 50(4): 281-283.
    YING S, HOLLEMAN J, and OTIS B P. A digital 1.6 pJ/bit chip identification circuit using process variations[J]. IEEE Journal of Solid-State Circuits, 2008, 41(3): 69-77.
    HOLCOMB D E, BURLESON W P, and FU K. Power-up SRAM state as an identifying fingerprint and source of true random numbers[J]. IEEE Transactions on Computers, 2009, 58(9): 1198-1210.
    WANG Pengjun, ZHANG Yuejun, HAN Jun, et al. Architecture and physical implementation of reconfigurable multi-port physical unclonable functions in 65 nm CMOS[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2013, E96-A(5): 963-970.
    ZHANG Le, FONG Xuanyao, CHANG Chiphong, et al. Optimizating emerging nonvolatile memories for dual-mode applications: Data storage and key generator[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2015, 34(7): 1176-1187.
    ZHANG Le, FONG Xuanyao, CHANG Chiphong, et al. Highly reliable spin-transfer torque magnetic RAM-based physical unclonable function with multi-response-bits per cell [J]. IEEE Transactions on Information Forensics and Security, 2015, 10(8): 1630-1642.
    ZHANG Jiliang, LIN Yaping, LYU Yongqiang, et al. A PUF-FSM binding scheme for FPGA IP protection and pay- per-device licensing[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(6): 1137-1150.
    项群良, 张培勇, 欧阳冬生, 等. 多频率段物理不可克隆函数[J]. 电子与信息学报, 2012, 34(8): 2007-2012. doi: 10.3724/ SP.J.1146.2011.01249.
    XIANG Qunliang, ZHANG Peiyong, OUYANG Dongsheng, et al. Multiple frequency slots based physical unclonable functions[J]. Journal of Electronics Information Technology, 2012, 34 (8): 2007-2012. doi: 10.3724/SP.J.1146.2011.01249.
    BHARGAVE M and MAI K. An efficient reliable PUF-based cryptographic key generator in 65 nm CMOS[C]. Design, Automation and Test in Europe Conference and Exhibition (DATE), Dresden, Germany, 2014: 1-6.
    GAO Yansong, RANASINGHE D C, AL-SARAWI S F, et al. Memristive crypto primitive for building highly secure physical unclonable functions[J]. Scientific Reports, 2015, 5(12785): 1-14.
    RUHRMAIR U, SOLTER J, SEHNKE F, et al. PUF modeling attacks on simulated and silicon data[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(11): 1876-1891.
    SAHOO D P, NGUYEN P H, MUKHOPADHYAY D, et al. A case of lightweight PUF constructions: cryptanalysis and machine learning attacks[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2015, 34(8): 1334-1343.
    WAN Meilin, HE Zhangqing, HAN Shuang, et al. An invasive-attack-resistant PUF based on switched-capacitor circuit[J]. IEEE Transactions on Circuits and Systems I: Regular Papers, 2015, 62(8): 2024-2034.
    UNGER S H. Hazards, critical races, and metastability[J]. IEEE Transactions on Computers, 1995, 44(6): 754-768.
    THEODORIDIS G, THEODORIDIS S, SOUDRIS D, et al. Switching activity estimation under real-gate delay using timed Boolean functions[J]. IEE Proceedings-Computers and Digital Techniques, 2000, 147(6): 444-450.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1386) PDF downloads(431) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return