Quality Limitations on the Extraction of a PUF-based Cryptographic Key
|
|
|
- Elaine Franklin
- 9 years ago
- Views:
Transcription
1 Quality Limitations on the Extraction of a PUF-based Cryptographic Key Sandra L. Lattacher, TECHNIKON Forschungs- und Planungsgesellschaft mbh Joint work with Martin Deutschmann, Michael Höberl, Christina Petschnigg, and Naeim Safari 1. Introduction An indispensable demand for the majority of cryptographic implementations is the ability to securely generate and store cryptographic keys. Physically Unclonable Functions (PUFs) prove to be a suitable primitive to comply these requirements. PUFs can be understood as physical systems which, when measured, provide unique and unpredictable responses. The responses are depending on the physical structure of the device and are out of the control of the manufacturer. As PUFs are physical objects they are prone to errors, i.e. the responses will always include some degree of noise. Further the distribution of the responses does not necessarily have to be uniform. In other words, when designing key generation or protection schemes based on PUF measurements, one has to make sure that suitable error correcting mechanisms are put in place. Further entropy extraction is crucial, to ensure the generation of keys with high entropy. In this work we are exposing the limits in the design of a key generation framework by taking into account relevant properties of PUF instantiations, such as entropy or the mutual information. Our attempt is to present a tool to evaluate if and how a cryptographic key of a certain length can be extracted with the demanded reliability for a given PUF source. The solutions presented are evaluated against concrete PUF parameters. The PUF source are 65nm TSMC ASICs, which were developed in the course of the FP7 research project UNIQUE The PUF Framework By challenging the PUF twice consecutively with identical conditions, we expect an unreliability of the two responses R and R reflected by the so-called intra distance. Moreover, when comparing two different instances of a PUF type, an inter distance of about 50% is desired. To reliably generate cryptographic keys, the PUF response has to be processed within a specific framework that can cope with the noise cancellation and the entropy extraction. This is where so called Helper Data Algorithms (HDAs) come into play. Most HDAs follow a two-step approach: the key is derived by querying the PUF in a secure environment during an enrollment phase. During the so called reconstruction phase the key is recovered in the field. A HDA can additionally be divided into three sub-components. The first is bit selection, aiming at discarding the least reliable bits within a PUF response. This step can significantly lower the number of expected errors within the response and thus allowing the application of shorter and simpler error correcting codes. Applying bit selection as well as error correction measures allow the assumption of a negligible low failure rate during reconstruction. However, the remaining bits have non-maximum entropy due to leakage during the former two steps. Therefore, the third step comprises entropy compression. [5] 3. Quality Aspects of a Key Generally speaking there are two main areas that might affect the quality level of a key: the property of the raw data, and the helper data leakage, including the choice of the error correction and the randomness extraction. A rough assessment on the quality of the data is the Hamming weight of the response which gives a first indication of the randomness, since it is a measure of the distribution of ones and zeros within a binary bit string: 1 1
2 2 (1) W (x) = x i. When designing key generation frameworks, a high level of unpredictability and robustness is claimed. Entropy estimation, which is the measure of uncertainty of a random variable, comprises in fact all relevant parameters. The Shannon entropy which is commonly used in information theory is defined as (2) H 1 (x) = i=1 p i log 2 p i, i=1 where x defines the binary random variable and p i the probability that x takes on zero or one. The limit of H 1 converges to the min-entropy: (3) H (x) = log max p i. i When transmitting information, it is assumed to be correct on the receiver side, but in fact, the signal will be superimposed by noise with a specific bit error probability p b. Assuming a given bit error probability we claim a failure rate of P fail For simple codes, an estimation of the probability that a string of n bits has more than t errors is given by: (4) P fail = i=t+1 ( n i ) p i b(1 p b ) n i With the use of a HDA, a key is derived from the raw PUF source bits by compressing the bits with a hash function. The amount of source bits that are needed to achieve a secret of a specific size is expressed in the so-called secrecy rate. The maximum achievable secrecy rate depends on the mutual information (5) I(x, y) = H(x) H(x y) between the measurement done at enrollment x and reconstruction y, where H(x y) describes the remaining entropy of x when y is known. In more detail, K/I(x, y) gives the number of required source bits to derive a secret of size K. [8] [18] Given any C[n, k, d] code the entropy loss within a practical realization of a HDA can be stated as n k. It follows that the leftover entropy l in the PUF response is given by l = m + k n, relying on the commonly used Random Oracle model [2] [12], where the loss during the entropy extraction is assumed as Evaluation and Limitations In the following, our aim is to show the limitations and boundary conditions when generating a 128-bit binary key based on different PUF instantiations, when having the quality aspects of Section 3 in mind. The used ASICs containing different PUF types are mounted on a customized evaluation board, that is connected via a ribbon cable to a Xilinx KC705 FPGA evaluation board. The ASICs are controlled via a dedicated IP block on the FPGA and the measurements are forwarded via a serial interface to a PC. We focused during the evaluation of raw PUF data on memory based PUFs, namely SRAM, Latch and DFF PUFs. Table 1 lists in addition to the bit error rate, also the maximum number of source bits N as well as the entropy H 1 (x), the min-entropy H (x), the mutual information I(x, y) and the Hamming weight W (x) for SRAM, DFF and Latch PUFs. The SRAM PUF behaves worst regarding the bit error rate with a value of 5.2%. In contrast, the other parameters such as the entropy values or the
3 3 Type p b N H 1(x) H I(x, y) W (x) SRAM 5.2% DFF 3.1% Latch 2.5% Table 1. Quality measures of memory-based PUFs at room temperature. Hamming weight come close to an optimum. The biased output of DFF and the Latch PUF expressed by the Hamming weight influences the entropy and the min-entropy, which is significantly lower for these two PUF types. Figure 1 depicts the dependency between the code parameters n and d with respect to a failure rate P fail 10 6 for the evaluated PUF types P fail 10 6 SRAM DFF code parameter d Latch 5 P fail > code parameter n Figure 1. Dependency of the code parameters n and d regarding the failure rate P fail for SRAM, DFF and Latch PUFs. Targeting secure key generation, the leftover entropy is the second point that has to be considered. Student Version MATLAB It is common practice to process the PUF response in blocks of equal length n. With a given entropy, the mutual information and a desired key length of 128 bit, a lower bound of the block numbers l min is derived. Depending on the number of available source bits N, an upper bound l max can be determined. As long as l max > l min, the key generation will be successful with maximum achievable entropy. Based on these assumptions, all free parameters can be combined to a threshold function (6) f T (k, n) = k sn o, where s is the slope, o the offset of the function and k, n are the variable code parameters. In Table 2 the fixed parameters of f T are shown for a changing number of source bits and for the different PUF types. Generally, the slope of the threshold function tends to increase, when the entropy decreases at the same time. The key can be derived with maximum achievable entropy with a specific code when f(k, n) Conclusion The aim of this paper was to present a hands-on guide on how to design tailored PUF-based key generation frameworks, taking into account the limitations given by the PUF source and the HDA. With the implementation of a threshold function, we are able to expose the limits of reliable key generation while considering the relevant quality aspects at the same time. There are a couple of published papers that describe the design of HDAs, the choice of the error correcting code, the
4 Type s o s o s o s o SRAM DFF Latch Table 2. Parameters of the threshold function for the feasibility of key generation given the slope s and the offset o. consideration of entropy loss or statistical analysis of different PUF sources. To our best knowledge, however, there is no paper that tries to draw a complete picture, reaching from statistical investigation on the PUF source to the actual HDA design. Acknowledgment. This work was supported in part by the European Commission through the ICT programme under contract FP7-ICT HINT. References [1] Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, Berk Sunar, and Pim Tuyls, Memory leakage-resilient encryption based on physically unclonable functions, Towards Hardware-Intrinsic Security, Springer, 2010, pp [2] Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, Francois-Xavier Standaert, and Yu Yu, Leftover hash lemma, revisited, Cryptology eprint Archive, Report 2011/088, 2011, eprint.iacr.org/. [3] Christoph Boesch, Jorge Guajardo, Ahmad-Reza Sadeghi, Jamshid Shokrollahi, and Pim Tuyls, Efficient Helper Data Key Extractor on FPGAs, Proceedings of the 10 th International Workshop on Cryptographic Hardware and Embedded Systems CHES 2008, Lecture Notes in Computer Science, vol. 5154, Springer Berlin Heidelberg, 2008, pp (English). [4] J. Delvaux and I. Verbauwhede, Key-recovery attacks on various RO PUF constructions via helper data manipulation, Proceedings of the Conference on Design, Automation and Test in Europe Conference and Exhibition (DATE), 2014, March 2014, pp [5] Jeroen Delvaux, Dawu Gu, Dries Schellekens, and Ingrid Verbauwhede, Helper Data Algorithms for PUF- Based Key Generation: Overview and Analysis, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems PP (2014), no. 99, 1 1. [6] Jeroen Delvaux and Ingrid Verbauwhede, Fault Injection Modeling Attacks on 65nm Arbiter and RO Sum PUFs via Environmental Changes, IACR Cryptology eprint Archive 2013 (2013), 619. [7] Jeroen Delvaux and Ingrid Verbauwhede, Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation, Topics in Cryptology CT-RSA 2014, Lecture Notes in Computer Science, vol. 8366, Springer International Publishing, 2014, pp (English). [8] Jorge Guajardo, Sandeep S. Kumar, Geert-Jan Schrijen, and Pim Tuyls, FPGA Intrinsic PUFs and Their Use for IP Protection, Proceedings of the 9 th International Workshop on Cryptographic Hardware and Embedded Systems - CHES 2007, Lecture Notes in Computer Science, vol. 4727, Springer Berlin Heidelberg, 2007, pp (English). [9] Maximilian Hofer and Christoph Boehm, An Alternative to Error Correction for SRAM-Like PUFs, Proceedings of the 12 th Internatinal Workshop on Cryptographic Hardware and Embedded Systems, CHES 2010, Lecture Notes in Computer Science, vol. 6225, Springer Berlin / Heidelberg, 2011, pp [10] Stefan Katzenbeisser, Ünal Kocabaş, Vladimir Rožić, Ahmad-Reza Sadeghi, Ingrid Verbauwhede, and Christian Wachsmann, PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions(PUFs) Cast in Silicon, Proceedings of the 14 th Internatinal Workshop on Cryptographic Hardware and Embedded Systems CHES 2012, Lecture Notes in Computer Science, vol. 7428, Springer Berlin Heidelberg, 2012, pp (English). [11] P. Koeberl, Jiangtao Li, A. Rajan, and Wei Wu, Entropy loss in puf-based key generation schemes: The repetition code pitfall, Hardware-Oriented Security and Trust (HOST), 2014 IEEE International Symposium on, May 2014, pp [12] Roel Maes, Physically unclonable functions - constructions, properties and applications, Springer, [13] Roel Maes, Pim Tuyls, and Ingrid Verbauwhede, Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs, Proceedings of the 11 th International Workshop on Cryptographic Hardware and Embedded Systems - CHES 2009, Lecture Notes in Computer Science, vol. 5747, Springer Berlin Heidelberg, 2009, pp (English).
5 5 [14] Roel Maes, Anthony Van Herrewege, and Ingrid Verbauwhede, PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator, Proceedings of the 14 th International Workshop on Cryptographic Hardware and Embedded Systems CHES 2012, Lecture Notes in Computer Science, vol. 7428, Springer Berlin Heidelberg, 2012, pp (English). [15] Roel Maes and Ingrid Verbauwhede, Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions, Towards Hardware-Intrinsic Security, Springer Berlin Heidelberg, 2010, pp (English). [16] R.S. Pappu, Physical one-way functions, Massachusetts Institut of Technology, [17] Ying Su, J. Holleman, and B.P. Otis, A Digital 1.6 pj/bit Chip Identification Circuit Using Process Variations, IEEE Journal of Solid-State Circuits 43 (2008), no. 1, [18] Robbert van den Berg, Boris Skoric, and Vincent van der Leest, Bias-based Modeling and Entropy Analysis of PUFs, Proceedings of the 3rd International Workshop on Trustworthy Embedded Devices (New York, NY, USA), TrustED 13, ACM, 2013, pp [19] Vincent van der Leest, Bart Preneel, and Erik van der Sluis, Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment, Proceedings of the 14 th International Workshop on Cryptographic Hardware and Embedded SystemsCHES 2012, Lecture Notes in Computer Science, vol. 7428, Springer Berlin Heidelberg, 2012, pp
Anti-Counterfeiting with Hardware Intrinsic Security
Anti-Counterfeiting with Hardware Intrinsic Security Vincent van der Leest and Pim Tuyls Intrinsic-ID, Eindhoven, The Netherlands http://www.intrinsic-id.com Abstract Counterfeiting of goods and electronic
Logically Reconfigurable PUFs: Memory-Based Secure Key Storage
Logically Reconfigurable PUFs: Memory-Based Secure Key Storage Ilze Eichhorn Intrinsic-ID High Tech Campus 9 Eindhoven, The Netherlands ilze.eichhorn@ intrinsic-id.com Patrick Koeberl Intel Ireland Collinstown
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in
Modeling SRAM Start-Up Behavior for Physical Unclonable Functions
Modeling SRAM Start-Up Behavior for Physical Unclonable Functions Mafalda Cortez Apurva Dargar Said Hamdioui Delft University of Technology Faculty of EE, Mathematics and CS Mekelweg 4, 2628 CD Delft,
Final Report on Prototype Testing
.. D1.2: Final Report on Prototype Testing Project number: 835932 Project acronym: CODES Project title: Algorithmic extraction and error-correction codes for lightweight security anchors with reconfigurable
Breaking through Fixed PUF Block Limitations with Differential Sequence Coding and Convolutional Codes 04/11/2013
Matthias Hiller, Michael Weiner, Leandro Rodrigues Lima, Maximilian Birkner and Georg Sigl Breaking through Fixed PUF Block Limitations with Differential Sequence Coding and Convolutional Codes International
Lightweight and Secure PUF Key Storage Using Limits of Machine Learning
Lightweight and Secure PUF Key Storage Using Limits of Machine Learning Meng-Day (Mandel) Yu 1, David M Raïhi 1, Richard Sowell 1, Srinivas Devadas 2 1 Verayo, Inc., San Jose, CA, USA 2 MIT, Cambridge,
Security Analysis of DRBG Using HMAC in NIST SP 800-90
Security Analysis of DRBG Using MAC in NIST SP 800-90 Shoichi irose Graduate School of Engineering, University of Fukui hrs [email protected] Abstract. MAC DRBG is a deterministic random bit generator
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
Key Agreement from Close Secrets over Unsecured Channels Winter 2010
Key Agreement from Close Secrets over Unsecured Channels Winter 2010 Andreas Keller Contens 1. Motivation 2. Introduction 3. Building Blocks 4. Protocol Extractor Secure Sketches (MAC) message authentication
Applying Remote Side-Channel Analysis Attacks on a Security-enabled NFC Tag
Applying Remote Side-Channel Analysis Attacks on a Security-enabled NFC Tag Thomas Korak Thomas Plos Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology,
On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments
On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments Suman Jana, Sriram Nandha Premnath Mike Clark, Sneha K. Kasera, Neal Patwari University of Utah Srikanth
ON SUITABILITY OF FPGA BASED EVOLVABLE HARDWARE SYSTEMS TO INTEGRATE RECONFIGURABLE CIRCUITS WITH HOST PROCESSING UNIT
216 ON SUITABILITY OF FPGA BASED EVOLVABLE HARDWARE SYSTEMS TO INTEGRATE RECONFIGURABLE CIRCUITS WITH HOST PROCESSING UNIT *P.Nirmalkumar, **J.Raja Paul Perinbam, @S.Ravi and #B.Rajan *Research Scholar,
Developing and Investigation of a New Technique Combining Message Authentication and Encryption
Developing and Investigation of a New Technique Combining Message Authentication and Encryption Eyas El-Qawasmeh and Saleem Masadeh Computer Science Dept. Jordan University for Science and Technology P.O.
Non-Black-Box Techniques In Crytpography. Thesis for the Ph.D degree Boaz Barak
Non-Black-Box Techniques In Crytpography Introduction Thesis for the Ph.D degree Boaz Barak A computer program (or equivalently, an algorithm) is a list of symbols a finite string. When we interpret a
Recommendation for Applications Using Approved Hash Algorithms
NIST Special Publication 800-107 Recommendation for Applications Using Approved Hash Algorithms Quynh Dang Computer Security Division Information Technology Laboratory C O M P U T E R S E C U R I T Y February
Security Analysis for Order Preserving Encryption Schemes
Security Analysis for Order Preserving Encryption Schemes Liangliang Xiao University of Texas at Dallas Email: [email protected] Osbert Bastani Harvard University Email: [email protected] I-Ling
PUF Physical Unclonable Functions
Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication
Software Hardware Binding with Quiddikey
Software Hardware Binding with Quiddikey Mass scale solution against software piracy Secure your digital life Software-Hardware Binding solutions are typically required for Flash-based systems in which
An Application of Visual Cryptography To Financial Documents
An Application of Visual Cryptography To Financial Documents L. W. Hawkes, A. Yasinsac, C. Cline Security and Assurance in Information Technology Laboratory Computer Science Department Florida State University
Sequential Logic. (Materials taken from: Principles of Computer Hardware by Alan Clements )
Sequential Logic (Materials taken from: Principles of Computer Hardware by Alan Clements ) Sequential vs. Combinational Circuits Combinatorial circuits: their outputs are computed entirely from their present
Victor Shoup Avi Rubin. fshoup,[email protected]. Abstract
Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin Bellcore, 445 South St., Morristown, NJ 07960 fshoup,[email protected] Abstract In this paper, we investigate a method by which smart
Hardware Trojans Detection Methods Julien FRANCQ
DEFENDING WORLD SECURITY Hardware Trojans Detection Methods Julien FRANCQ 2013, December the 12th Outline c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 2 /
MODELING RANDOMNESS IN NETWORK TRAFFIC
MODELING RANDOMNESS IN NETWORK TRAFFIC - LAVANYA JOSE, INDEPENDENT WORK FALL 11 ADVISED BY PROF. MOSES CHARIKAR ABSTRACT. Sketches are randomized data structures that allow one to record properties of
Linear Codes. Chapter 3. 3.1 Basics
Chapter 3 Linear Codes In order to define codes that we can encode and decode efficiently, we add more structure to the codespace. We shall be mainly interested in linear codes. A linear code of length
IoT Security Platform
IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there
Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
A Secure Decentralized Access Control Scheme for Data stored in Clouds
A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
Secure Large-Scale Bingo
Secure Large-Scale Bingo Antoni Martínez-Ballesté, Francesc Sebé and Josep Domingo-Ferrer Universitat Rovira i Virgili, Dept. of Computer Engineering and Maths, Av. Països Catalans 26, E-43007 Tarragona,
Friendly Medical Image Sharing Scheme
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Frily Medical Image Sharing Scheme Hao-Kuan Tso Department of Computer
2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India
Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity
How To Fix A 3 Bit Error In Data From A Data Point To A Bit Code (Data Point) With A Power Source (Data Source) And A Power Cell (Power Source)
FPGA IMPLEMENTATION OF 4D-PARITY BASED DATA CODING TECHNIQUE Vijay Tawar 1, Rajani Gupta 2 1 Student, KNPCST, Hoshangabad Road, Misrod, Bhopal, Pin no.462047 2 Head of Department (EC), KNPCST, Hoshangabad
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan
Lecture 9 - Message Authentication Codes
Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,
Data Cleansing for Remote Battery System Monitoring
Data Cleansing for Remote Battery System Monitoring Gregory W. Ratcliff Randall Wald Taghi M. Khoshgoftaar Director, Life Cycle Management Senior Research Associate Director, Data Mining and Emerson Network
1 Construction of CCA-secure encryption
CSCI 5440: Cryptography Lecture 5 The Chinese University of Hong Kong 10 October 2012 1 Construction of -secure encryption We now show how the MAC can be applied to obtain a -secure encryption scheme.
Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan
Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan 1 Internet of Things (IoT) CASAGRAS defined that: A global
Horst Görtz Institute for IT-Security
Horst Görtz Institute for IT-Security On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks Extracting Keys from Xilinx Virtex-II FPGAs Amir Moradi, Alessandro Barenghi, Timo
VoteID 2011 Internet Voting System with Cast as Intended Verification
VoteID 2011 Internet Voting System with Cast as Intended Verification September 2011 VP R&D Jordi [email protected] Index Introduction Proposal Security Conclusions 2. Introduction Client computers could
Hardware Implementation of AES Encryption and Decryption System Based on FPGA
Send Orders for Reprints to [email protected] The Open Cybernetics & Systemics Journal, 2015, 9, 1373-1377 1373 Open Access Hardware Implementation of AES Encryption and Decryption System Based
Offline HW/SW Authentication for Reconfigurable Platforms
Offline HW/SW Authentication for Reconfigurable Platforms Eric Simpson Virginia Tech [email protected] Patrick Schaumont Virginia Tech [email protected] Abstract Many Field-Programmable Gate Array (FPGA) based
One-Way Encryption and Message Authentication
One-Way Encryption and Message Authentication Cryptographic Hash Functions Johannes Mittmann [email protected] Zentrum Mathematik Technische Universität München (TUM) 3 rd Joint Advanced Student School
A PC-BASED TIME INTERVAL COUNTER WITH 200 PS RESOLUTION
35'th Annual Precise Time and Time Interval (PTTI) Systems and Applications Meeting San Diego, December 2-4, 2003 A PC-BASED TIME INTERVAL COUNTER WITH 200 PS RESOLUTION Józef Kalisz and Ryszard Szplet
Gambling and Data Compression
Gambling and Data Compression Gambling. Horse Race Definition The wealth relative S(X) = b(x)o(x) is the factor by which the gambler s wealth grows if horse X wins the race, where b(x) is the fraction
2 Protocol Analysis, Composability and Computation
2 Protocol Analysis, Composability and Computation Ross Anderson, Michael Bond Security protocols early days The study of security protocols has been associated with Roger Needham since 1978, when he published
Static-Noise-Margin Analysis of Conventional 6T SRAM Cell at 45nm Technology
Static-Noise-Margin Analysis of Conventional 6T SRAM Cell at 45nm Technology Nahid Rahman Department of electronics and communication FET-MITS (Deemed university), Lakshmangarh, India B. P. Singh Department
I. INTRODUCTION. of the biometric measurements is stored in the database
122 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL 6, NO 1, MARCH 2011 Privacy Security Trade-Offs in Biometric Security Systems Part I: Single Use Case Lifeng Lai, Member, IEEE, Siu-Wai
Yale University Department of Computer Science
Yale University Department of Computer Science On Backtracking Resistance in Pseudorandom Bit Generation (preliminary version) Michael J. Fischer Michael S. Paterson Ewa Syta YALEU/DCS/TR-1466 October
Lecture 15 - Digital Signatures
Lecture 15 - Digital Signatures Boaz Barak March 29, 2010 Reading KL Book Chapter 12. Review Trapdoor permutations - easy to compute, hard to invert, easy to invert with trapdoor. RSA and Rabin signatures.
Image Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
KEEP IT SYNPLE STUPID
Utilizing Programmable Logic for Analyzing Hardware Targets Dmitry Nedospasov SHORT DESCRIPTION Hardware security analysis differs from software security analysis primarily in the tools
Contents 1. Introduction 2. Simulation Approach 3. Elementary Circuits
Abstract Physical Unclonable Functions (PUFs) present a promising concept for cryptographic hardware. PUFs provide a challenge-response scheme, where the response is not calculated but determined by a
C O M P U T E R S E C U R I T Y
NIST Special Publication 800-56C Recommendation for Key Derivation through Extraction-then-Expansion Lily Chen Computer Security Division Information Technology Laboratory C O M P U T E R S E C U R I T
Ex. 2.1 (Davide Basilio Bartolini)
ECE 54: Elements of Information Theory, Fall 00 Homework Solutions Ex.. (Davide Basilio Bartolini) Text Coin Flips. A fair coin is flipped until the first head occurs. Let X denote the number of flips
Introduction to Computer Security
Introduction to Computer Security Hash Functions and Digital Signatures Pavel Laskov Wilhelm Schickard Institute for Computer Science Integrity objective in a wide sense Reliability Transmission errors
A Parallel Processor for Distributed Genetic Algorithm with Redundant Binary Number
A Parallel Processor for Distributed Genetic Algorithm with Redundant Binary Number 1 Tomohiro KAMIMURA, 2 Akinori KANASUGI 1 Department of Electronics, Tokyo Denki University, [email protected]
A Network Flow Approach in Cloud Computing
1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges
Architecture bits. (Chromosome) (Evolved chromosome) Downloading. Downloading PLD. GA operation Architecture bits
A Pattern Recognition System Using Evolvable Hardware Masaya Iwata 1 Isamu Kajitani 2 Hitoshi Yamada 2 Hitoshi Iba 1 Tetsuya Higuchi 1 1 1-1-4,Umezono,Tsukuba,Ibaraki,305,Japan Electrotechnical Laboratory
Big Data & Scripting Part II Streaming Algorithms
Big Data & Scripting Part II Streaming Algorithms 1, Counting Distinct Elements 2, 3, counting distinct elements problem formalization input: stream of elements o from some universe U e.g. ids from a set
Implementation and Design of AES S-Box on FPGA
International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 232-9364, ISSN (Print): 232-9356 Volume 3 Issue ǁ Jan. 25 ǁ PP.9-4 Implementation and Design of AES S-Box on FPGA Chandrasekhar
MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.
MXMedia CipherStream Preliminary Assessment 1.0 Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.com Copyright 2012 Farncombe Belvedere Basing View Basingstoke RG21 4HG This document and the information
Chapter 1 Introduction
Chapter 1 Introduction 1. Shannon s Information Theory 2. Source Coding theorem 3. Channel Coding Theory 4. Information Capacity Theorem 5. Introduction to Error Control Coding Appendix A : Historical
USB Portable Storage Device: Security Problem Definition Summary
USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides
APPLICATION OF ADVANCED SEARCH- METHODS FOR AUTOMOTIVE DATA-BUS SYSTEM SIGNAL INTEGRITY OPTIMIZATION
APPLICATION OF ADVANCED SEARCH- METHODS FOR AUTOMOTIVE DATA-BUS SYSTEM SIGNAL INTEGRITY OPTIMIZATION Harald Günther 1, Stephan Frei 1, Thomas Wenzel, Wolfgang Mickisch 1 Technische Universität Dortmund,
A Secure RFID Ticket System For Public Transport
A Secure RFID Ticket System For Public Transport Kun Peng and Feng Bao Institute for Infocomm Research, Singapore Abstract. A secure RFID ticket system for public transport is proposed in this paper. It
Reconfigurable Architecture Requirements for Co-Designed Virtual Machines
Reconfigurable Architecture Requirements for Co-Designed Virtual Machines Kenneth B. Kent University of New Brunswick Faculty of Computer Science Fredericton, New Brunswick, Canada [email protected] Micaela Serra
Secure SCADA Communication Protocol Performance Test Results
PNNL-17118 Secure SCADA Communication Protocol Performance Test Results M.D. Hadley K.A. Huston August 2007 Prepared for U.S. Department of Energy Office of Electricity Delivery and Energy Reliability
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers Brian Carrier Research Scientist @stake Abstract This paper uses the theory of abstraction layers to describe the purpose
ISSCC 2003 / SESSION 4 / CLOCK RECOVERY AND BACKPLANE TRANSCEIVERS / PAPER 4.7
ISSCC 2003 / SESSION 4 / CLOCK RECOVERY AND BACKPLANE TRANSCEIVERS / PAPER 4.7 4.7 A 2.7 Gb/s CDMA-Interconnect Transceiver Chip Set with Multi-Level Signal Data Recovery for Re-configurable VLSI Systems
NIOS II Based Embedded Web Server Development for Networking Applications
NIOS II Based Embedded Web Server Development for Networking Applications 1 Sheetal Bhoyar, 2 Dr. D. V. Padole 1 Research Scholar, G. H. Raisoni College of Engineering, Nagpur, India 2 Professor, G. H.
ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 3, May 2013
Transistor Level Fault Finding in VLSI Circuits using Genetic Algorithm Lalit A. Patel, Sarman K. Hadia CSPIT, CHARUSAT, Changa., CSPIT, CHARUSAT, Changa Abstract This paper presents, genetic based algorithm
Support Vector Machines for Dynamic Biometric Handwriting Classification
Support Vector Machines for Dynamic Biometric Handwriting Classification Tobias Scheidat, Marcus Leich, Mark Alexander, and Claus Vielhauer Abstract Biometric user authentication is a recent topic in the
An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud
, pp.246-252 http://dx.doi.org/10.14257/astl.2014.49.45 An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud Jiangang Shu ab Xingming Sun ab Lu Zhou ab Jin Wang ab
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de
Entropy and Mutual Information
ENCYCLOPEDIA OF COGNITIVE SCIENCE 2000 Macmillan Reference Ltd Information Theory information, entropy, communication, coding, bit, learning Ghahramani, Zoubin Zoubin Ghahramani University College London
