Barrel Shifter Physical Unclonable Function Based Encryption

被引:12
作者
Guo, Yunxi [1 ]
Dee, Timothy [1 ]
Tyagi, Akhilesh [1 ]
机构
[1] Iowa State Univ, Dept Elect & Comp Engn, Ames, IA 50011 USA
关键词
barrel shifter; physical unclonable function (PUF); encryption;
D O I
10.3390/cryptography2030022
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Physical Unclonable Functions (PUFs) are designed to extract physical randomness from the underlying silicon. This randomness depends on the manufacturing process. It differs for each device. This enables chip-level authentication and key generation applications. We present an encryption protocol using PUFs as primary encryption/decryption functions. Each party has a PUF used for encryption and decryption. This PUF is constrained to be invertible and commutative. The focus of the paper is an evaluation of an invertible and commutative PUF based on a primitive shifting permutation network-a barrel shifter. Barrel shifter (BS) PUF captures the delay of different shift paths. This delay is entangled with message bits before they are sent across an insecure channel. BS-PUF is implemented using transmission gates for physical commutativity. Post-layout simulations of a common centroid layout 8-level barrel shifter in 0.13 <mml:semantics>mu</mml:semantics>m technology assess uniqueness, stability, randomness and commutativity properties. BS-PUFs pass all selected NIST statistical randomness tests. Stability similar to Ring Oscillator (RO) PUFs under environmental variation is shown. Logistic regression of 100,000 plaintext-ciphertext pairs (PCPs) fails to successfully model BS-PUF behavior.
引用
收藏
页码:1 / 19
页数:19
相关论文
共 33 条
[1]  
[Anonymous], 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2010), P100, DOI 10.1109/HST.2010.5513105
[2]  
Back T., 1996, EVOLUTIONARY ALGORIT
[3]   THE FUNDAMENTAL PHYSICAL LIMITS OF COMPUTATION [J].
BENNETT, CH ;
LANDAUER, R .
SCIENTIFIC AMERICAN, 1985, 253 (01) :48-56
[4]  
Bertoni G., THE KECCAK REFERENCE
[5]  
Bertoni G., 2016, CAESAR SUBMISSION KE
[6]  
Bishop C. M., 2006, PATTERN RECOGN
[7]  
Boneh D., 1999, NOTICES AM MATH SOC, V46, P203
[8]  
Che WJ, 2015, ICCAD-IEEE ACM INT, P337, DOI 10.1109/ICCAD.2015.7372589
[9]  
Chen Q., 2009, 2009 12th International Symposium on Integrated Circuits (ISIC 2009), P121
[10]  
Daemen J., 2013, DESIGN RIJNDAEL AES