Affiliation:
1. School of Integrated Circuits and Electronics, Beijing Institute of Technology, Beijing 100081, China
2. UNISOC (Shanghai) Technology Co., Ltd., Shanghai 201203, China
3. BIT Chongqing Institute of Microelectronics and Microsystems, Chongqing 401332, China
4. School of Information and Electronics, Beijing Institute of Technology, Beijing 100081, China
Abstract
Physically unclonable functions (PUFs) are crucial for enhancing cybersecurity by providing unique, intrinsic identifiers for electronic devices, thus ensuring their authenticity and preventing unauthorized cloning. The SRAM-PUF, characterized by its simple structure and ease of implementation in various scenarios, has gained widespread usage. The soft-decision Reed–Muller (RM) code, an error correction code, is commonly employed in these designs. This paper introduces the design of an RM code soft-decision attack algorithm to reveal its potential security risks. To address this problem, we propose a soft-decision SRAM-PUF structure based on the elliptic curve digital signature algorithm (ECDSA). To improve the processing speed of the proposed secure SRAM-PUF, we propose a custom ECDSA scheme. Further, we also propose a universal architecture for the critical operations in ECDSA, elliptic curve scalar multiplication (ECSM), and elliptic curve double scalar multiplication (ECDSM) based on the differential addition chain (DAC). For ECSMs, iterations can be performed directly; for ECDSMs, a two-dimensional DAC is constructed through precomputation, followed by iterations. Moreover, due to the high similarity of ECSM and ECDSM data paths, this universal architecture saves hardware resources. Our design is implemented on a field-programmable gate array (FPGA) and an application-specific integrated circuit (ASIC) using a Xilinx Virtex-7 and an TSMC 40 nm process. Compared to existing research, our design exhibits a lower bit error rate (2.7×10−10) and better area–time performance (3902 slices, 6.615 μs ECDSM latency).
Funder
Chongqing Natural Science Foundation
Reference34 articles.
1. Arora, H., Soni, G.K., Kushwaha, R.K., and Prasoon, P. (2021, January 8–10). Digital image security based on the hybrid model of image hiding and encryption. Proceedings of the 2021 6th International Conference on Communication and Electronics Systems (ICCES), Coimbatre, India.
2. Matted, S., Shankar, G., and Jain, B.B. (2021). Computer Networks and Inventive Communication Technologies, Springer.
3. Halak, B., Zwolinski, M., and Mispan, M.S. (2016, January 16–19). Overview of PUF-based hardware security solutions for the Internet of Things. Proceedings of the 2016 IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS), Abu Dhabi, United Arab Emirates.
4. PUF-based authentication and key agreement protocols for IoT, WSNs and smart grids: A comprehensive survey;Mall;IEEE Internet Things J.,2022
5. Power-up SRAM state as an identifying fingerprint and source of true random numbers;Holcomb;IEEE Trans. Comput.,2008