Testing Methods for PUF-Based Secure Key Storage Circuits

نویسندگان

  • Mafalda Cortez
  • Gijs Roelofs
  • Said Hamdioui
  • Giorgio Di Natale
چکیده

Design for test is an integral part of any VLSI chip. However, for secure systems extra precautions have to be taken to prevent that the test circuitry could reveal secret information. This paper addresses secure test for Physical Unclonable Function based systems. It investigates two secure Built-In Self-Test (BIST) solutions for Fuzzy Extractor (FE) which is the main component of PUF-based systems. The schemes target high stuck-at-fault (SAF) coverage by performing scan-chain free functional testing, to prevent scan-chain abuse for attacks. The first scheme reuses existing FE blocks (for pattern generation and compression) to minimize the area overhead, while the second scheme tests all the FE blocks simultaneously to minimize the test time. The schemes are integrated in FE design and simulated; the results show that for the first test scheme, a SAF fault coverage of 95 % can be realized with no more than 47.1k clock cycles at the cost of a negligible area overhead of only 2.2 %; while for the second test scheme a SAF fault coverage of 95 % can be realized with 3.5k clock cycles at the cost of 18.6 % area overhead. Higher fault coverages are possible to realize at extra cost (i.e., either by extending the test time, or by adding extra hardware, or a combination of both). Responsible Editor: M. Tehranipoor M. Cortez ( ) · G. Roelofs · S. Hamdioui Faculty of EE, Mathematics and CS, Delft University of Technology, Mekelweg 4, 2628 CD Delft, The Netherlands e-mail: [email protected] G. Di Natale Giorgio Di Natale LIRMM, Université Montpellier II, 161 Rue Ada, 34392 Montpellier Cedex 5, France e-mail: [email protected]

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Framework for the Evaluation of Physical Unclonable Functions

A PUF is a chip-unique challenge-response mechanism exploiting manufacturing process variation inside integrated circuits (ICs). It has many useful applications such as device authentication and secure, memory-less key storage. A mobile device can be authenticated using a PUF challenge-response pair. Moreover, a cryptographic key can be securely embedded in a mobile device using a PUF without a...

متن کامل

Towards a Secure Key Generation and Storage Framework on Resource-Constrained Sensor Nodes

Sensors have an essential role in the currently emerging Internet of Things (IoT) whereby these resource constrained nodes sense the environment, process the sensed data and forward it to a central entity. As some of this data might be sensitive in nature, it is crucial to ensure certain security guarantees on the sensed data such as integrity, confidentiality, and authenticity. Certain cryptog...

متن کامل

Physical Unclonable Function Hardware Keys Utilizing Kirchhoff-law-johnson-noise Secure Key Exchange and Noise-based Logic

Weak unclonable function (PUF) encryption key means that the manufacturer of the hardware can clone the key but not anybody else. Strong unclonable function (PUF) encryption key means that even the manufacturer of the hardware is unable to clone the key. In this paper, first we introduce an “ultra” strong PUF with intrinsic dynamical randomness, which is not only unclonable but also gets renewe...

متن کامل

Comparison of SRAM and FF PUF in 65nm Technology

Hardware security is an essential tool in the prevention of cloning, theft of service and tampering. This security is often based on cryptographic primitives, which use a key that is securely stored somewhere in the hardware. The strength of the security is therefore dependent upon the effort required from an attacker to compromise this key. Since the tools used to carry out attacks on hardware...

متن کامل

Physical uncloneable function hardware keys utilizing Kirchhoff-law-Johnson-noise secure key exchange and noise-based logic

Weak uncloneable function (PUF) encryption key means that the manufacturer of the hardware can clone the key but anybody else is unable to so that. Strong uncloneable function (PUF) encryption key means that even the manufacturer of the hardware is unable to clone the key. In this paper, first we introduce an "ultra"-strong PUF with intrinsic dynamical randomness, which is not only not cloneabl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Electronic Testing

دوره 30  شماره 

صفحات  -

تاریخ انتشار 2014