Font Size: a A A

Analysis Of Strong PUF Based Modeling Attack And Attack-Resistant Design

Posted on:2020-01-13Degree:MasterType:Thesis
Country:ChinaCandidate:Q Q MaFull Text:PDF
GTID:2428330590972316Subject:Circuits and Systems
Abstract/Summary:PDF Full Text Request
With the rapid development of the Internet and smart terminals,information security issues have received much attention in recent years.Physical Unclonable Function(PUF)is a new type of hardware security primitive that uses electronic devices to generate unique response information due to differences in manufacturing variations within the integrated circuit.PUF has the characteristics of anti-cloning,anticounterfeiting,low power consumption,etc.,which makes it have broad applications such as identification and authentication.This paper first introduces the basic concepts of PUF principle,evaluation strategy,structure classification,and then specifically analyzes the typical PUF structures,Arbiter PUF and XOR Arbiter PUF.Next,the formula of the corresponding structure and the corresponding mathematical models are given.In the following,the anti-model attack is analyzed in details,and an anti-attack structure design is also proposed.Two specific structural design schemes are given,which are XOR based MultiPUF(XMPUF)and the Multiplexer(MUX)-based MultiPUF(MMPUF).Also,the formula of the corresponding structure and the corresponding mathematical model are given.In this paper,the algorithms which are used to attack PUF are demonstrated in detail.The specific implementation of these algorithms and the results of the algorithms applied to different structures are given.Finally,the efficiency of different attack algorithms and the time consumed by the attacks are compared.The analysis of performance is carried out according to the proposed structural design.Firstly,the difference between the simulation model and the real circuit is analyzed.Then the influence of noise on the PUF output and the influence of noise on the attack results are analyzed from the noise perspective.Next,the influence of the number of multiplexers on the security of the structure is analyzed for the MMPUF.Finally,the hardware implementation of the MMPUF structure is given.According to the results,the MMPUF has good reliability and uniqueness,which indicates that MMPUF has high security and can be applied in practical applications.
Keywords/Search Tags:Information security, Physical Unclonable Function, Machine learning attack, Attack resistant PUF designs
PDF Full Text Request
Related items