Physical Unclonable Functions, FPGAs and Public-Key Crypto for IP Protection
نویسندگان
چکیده
In recent years, IP protection of FPGA hardware designs has become a requirement for many IP vendors. To this end solutions have been proposed based on the idea of bitstream encryption, symmetric-key primitives, and the use of Physical Unclonable Functions (PUFs). In this paper, we propose new protocols for the IP protection problem on FPGAs based on public-key (PK) cryptography, analyze the advantages and costs of such an approach, and describe a PUF intrinsic to current FPGAs based on SRAM properties. We observe that a major advantage in using PK-based protocols is that it allows for an implementation in which the private key stored in the FPGA never has to leave the device, thus increasing security. Finally, notice that this comes at the cost of additional hardware resources but not at significant performance degradation.
منابع مشابه
Intrinsic Physical Unclonable Functions in Field Programmable Gate Arrays
In today’s globalized economy, it has become standard business practice to include third party Intellectual Property (IP) into products. However, licensing IP to third parties forces IP vendors to ensure that they can generate revenue from their internally developed IP blocks. This is only guaranteed if designs are properly protected against theft, cloning, and grey market overproduction. In th...
متن کاملEfficient Helper Data Key Extractor on FPGAs
Physical Unclonable Functions (PUFs) have properties that make them very attractive for a variety of security-related applications. Due to their inherent dependency on the physical properties of the device that contains them, they can be used to uniquely bind an application to a particular device for the purpose of IP protection. This is crucial for the protection of FPGA applications against i...
متن کاملHOST Physical Unclonable Functions II ECE 495 / 595
PUFs: "Innovative circuit primitives that extract secrets from physical characteristics of ICs" Most proposed PUFs based on exploiting inherent delay characteristics of wires and transistors that differ from chip to chip because of manufacturing process variations Popular applications include low-cost authentication and generation of volatile secret key for crypto Typical applications of PUFs l...
متن کاملFPGA Intrinsic PUFs and Their Use for IP Protection
Counterfeiting of valuable goods in general and that of IP (embedded software) in particular leads to big revenue losses and is therefore a threat to the industry. In [31], Simpson and Schaumont proposed a fundamentally different approach to IP protection on FPGAs based on the use of Physical Unclonable Functions (PUFs). Their work only assumes the existence of a PUF on the FPGAs without actual...
متن کاملPartial bitstream protection for low-cost FPGAs with physical unclonable function, obfuscation, and dynamic partial self reconfiguration
This paper proposes a techniquebased onPhysicalUnclonable Functions (PUFs), obfuscation, and Dynamic Partial Self Reconfiguration (DPSR) to protect partial FPGA configuration bitstreams from cloning and reverse engineering. With the aid of this technique, we are able to do the equivalent of partial bitstream encryption on low-cost FPGAs, which is only featured on high-end FPGAs. Low-cost FPGAs ...
متن کامل