In this paper, a Glitch-PUF circuit technique is proposed by taking into consideration various aspects i.e. the signal transmission theory, race and hazard phenomenon, and Physical Unclonable Functions (PUF). First and foremost, the glitch circuit is obtained under the signal transmission theory. Using the combinational logic circuit propagation delay difference which causes 1-hazard and 0-hazard, this feature is used to form output glitch waveform. This glitch is sampled by multistage delay sampling circuit. Due to the nonlinear characteristics of the Glitch, Glitch-PUF can thwart the modeling attack. Finally, under the TSMC 65 nm CMOS technology, a 128-bit output data Glitch-PUF circuit is designed. Monte Carlo simulation results show that the Glitch PUF circuit has better randomness.
张跃军,汪鹏君,李刚,钱浩宇. 基于信号传输理论的Glitch物理不可克隆函数电路设计[J]. 电子与信息学报, 2016, 38(9): 2391-2396.
ZHANG Yuejun, WANG Pengjun, LI Gang, QIAN Haoyu. Design of Glitch Physical Unclonable Functions Circuit Based on Signal Transmission Theory. JEIT, 2016, 38(9): 2391-2396.
PAPPU R, RECHT B, TAYLOR J, et al. Physical one-way functions[J]. Science, 2002, 297(5589): 2026-2030.
[2]
LIM D, LEE J W, GASSEND B, et al. Extracting secret keys from integrated circuits[J]. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2005, 13(10): 1200-1205.
[3]
LAO Y J and PARHI K K. Statistical analysis of MUX-based physical unclonable functions[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2014, 33(5): 649-662.
[4]
CAO Yuan, ZHANG Le, CHANG Chiphong, et al. A low- power hybrid RO PUF with improved thermal stability for lightweight applications[J]. IEEE Transactions on Computer- Aided Design of Integrated Circuits and Systems, 2015, 34(7): 1143-1147.
[5]
WIECZOREK P Z and GOLOFIT K. Metastability occurrence based physical unclonable functions for FPGAs[J]. Electronics Letters, 2014, 50(4): 281-283.
[6]
YING S, HOLLEMAN J, and OTIS B P. A digital 1.6 pJ/bit chip identification circuit using process variations[J]. IEEE Journal of Solid-State Circuits, 2008, 41(3): 69-77.
[7]
HOLCOMB D E, BURLESON W P, and FU K. Power-up SRAM state as an identifying fingerprint and source of true random numbers[J]. IEEE Transactions on Computers, 2009, 58(9): 1198-1210.
[8]
WANG Pengjun, ZHANG Yuejun, HAN Jun, et al. Architecture and physical implementation of reconfigurable multi-port physical unclonable functions in 65 nm CMOS[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2013, E96-A(5): 963-970.
[9]
ZHANG Le, FONG Xuanyao, CHANG Chiphong, et al. Optimizating emerging nonvolatile memories for dual-mode applications: Data storage and key generator[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2015, 34(7): 1176-1187.
[10]
ZHANG Le, FONG Xuanyao, CHANG Chiphong, et al. Highly reliable spin-transfer torque magnetic RAM-based physical unclonable function with multi-response-bits per cell [J]. IEEE Transactions on Information Forensics and Security, 2015, 10(8): 1630-1642.
[11]
ZHANG Jiliang, LIN Yaping, LYU Yongqiang, et al. A PUF-FSM binding scheme for FPGA IP protection and pay- per-device licensing[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(6): 1137-1150.
XIANG Qunliang, ZHANG Peiyong, OUYANG Dongsheng, et al. Multiple frequency slots based physical unclonable functions[J]. Journal of Electronics & Information Technology, 2012, 34 (8): 2007-2012. doi: 10.3724/SP.J.1146.2011.01249.
[13]
BHARGAVE M and MAI K. An efficient reliable PUF-based cryptographic key generator in 65 nm CMOS[C]. Design, Automation and Test in Europe Conference and Exhibition (DATE), Dresden, Germany, 2014: 1-6.
[14]
GAO Yansong, RANASINGHE D C, AL-SARAWI S F, et al. Memristive crypto primitive for building highly secure physical unclonable functions[J]. Scientific Reports, 2015, 5(12785): 1-14.
[15]
RUHRMAIR U, SOLTER J, SEHNKE F, et al. PUF modeling attacks on simulated and silicon data[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(11): 1876-1891.
[16]
SAHOO D P, NGUYEN P H, MUKHOPADHYAY D, et al. A case of lightweight PUF constructions: cryptanalysis and machine learning attacks[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2015, 34(8): 1334-1343.
[17]
WAN Meilin, HE Zhangqing, HAN Shuang, et al. An invasive-attack-resistant PUF based on switched-capacitor circuit[J]. IEEE Transactions on Circuits and Systems I: Regular Papers, 2015, 62(8): 2024-2034.
[18]
UNGER S H. Hazards, critical races, and metastability[J]. IEEE Transactions on Computers, 1995, 44(6): 754-768.
[19]
THEODORIDIS G, THEODORIDIS S, SOUDRIS D, et al. Switching activity estimation under real-gate delay using timed Boolean functions[J]. IEE Proceedings-Computers and Digital Techniques, 2000, 147(6): 444-450.