Font Size: a A A

Signal Latency Based Chip Signature Extraction Techniques With Its Secure Application

Posted on:2009-07-02Degree:MasterType:Thesis
Country:ChinaCandidate:X F GaoFull Text:PDF
GTID:2178360242976731Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Nearly all the security issues of a computer system are due to the protection of the confidential information such as keys. But most of the current systems are weak in terms of protecting the keys; especially when facing the physical attack, the keys will easily get leaked so that the security of the computer system is damaged. Chip signature extends the differences of chips, which are caused by the impact of environment changes on the circuits and transistors during the manufacturing, is the unique identity of chip feature, so that can be used to construct a non-reproducible key to protect the security of the computer system.The chip signature extraction technique based on signal latency, as well as the application of this new technique, is discussed. Based on Daihyun's approach, two improved schemes are proposed and implemented on FPGA.The experiment results showed that improved scheme could produce more random signatures, and thus could be used to construct a non-reproducible key to protect the physical security of the system;The application of the chip signature in identity authentication was also introduced. Based on the analysis of Das'solution, an improved identity authentication protocol was introduced by using chip signature. The new protocol could protect the key in the chip from the physical nature. Based on the unique security feature, the new protocol could protect against impersonation attack, chip replication attack, DoS attack, replay attack, password-guess attack, etc. The new protocol could be widely used in those scenarios that required a high security environment.
Keywords/Search Tags:Chip Signature, FPGA, Key protection, identity authentication
PDF Full Text Request
Related items