skip to main content
DOE Patents title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Deterrence of device counterfeiting, cloning, and subversion by substitution using hardware fingerprinting

Abstract

Deterrence of device subversion by substitution may be achieved by including a cryptographic fingerprint unit within a computing device for authenticating a hardware platform of the computing device. The cryptographic fingerprint unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware platform. The PUF circuit is used to generate a PUF value. A key generator is coupled to generate a private key and a public key based on the PUF value while a decryptor is coupled to receive an authentication challenge posed to the computing device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

Inventors:
; ;
Issue Date:
Research Org.:
Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
Sponsoring Org.:
USDOE
OSTI Identifier:
1159918
Patent Number(s):
8,848,905
Application Number:
12/844,860
Assignee:
Sandia Corporation (Albuquerque, NM)
DOE Contract Number:  
AC04-94AL85000
Resource Type:
Patent
Country of Publication:
United States
Language:
English
Subject:
97 MATHEMATICS AND COMPUTING

Citation Formats

Hamlet, Jason R, Bauer, Todd M, and Pierson, Lyndon G. Deterrence of device counterfeiting, cloning, and subversion by substitution using hardware fingerprinting. United States: N. p., 2014. Web.
Hamlet, Jason R, Bauer, Todd M, & Pierson, Lyndon G. Deterrence of device counterfeiting, cloning, and subversion by substitution using hardware fingerprinting. United States.
Hamlet, Jason R, Bauer, Todd M, and Pierson, Lyndon G. Tue . "Deterrence of device counterfeiting, cloning, and subversion by substitution using hardware fingerprinting". United States. https://www.osti.gov/servlets/purl/1159918.
@article{osti_1159918,
title = {Deterrence of device counterfeiting, cloning, and subversion by substitution using hardware fingerprinting},
author = {Hamlet, Jason R and Bauer, Todd M and Pierson, Lyndon G},
abstractNote = {Deterrence of device subversion by substitution may be achieved by including a cryptographic fingerprint unit within a computing device for authenticating a hardware platform of the computing device. The cryptographic fingerprint unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware platform. The PUF circuit is used to generate a PUF value. A key generator is coupled to generate a private key and a public key based on the PUF value while a decryptor is coupled to receive an authentication challenge posed to the computing device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2014},
month = {9}
}

Patent:

Save / Share:

Works referenced in this record:

Controlled Activation of Function
patent-application, June 2010


Identification of an Antenna
patent-application, November 2010


Reconfigurable trusted computing in hardware
conference, January 2007

  • Eisenbarth, Thomas; Güneysu, Tim; Paar, Christof
  • Proceedings of the 2007 ACM workshop on Scalable trusted computing - STC '07
  • DOI: 10.1145/1314354.1314360

Dynamic Intellectual Property Protection for Reconfigurable Devices
conference, December 2007

  • Guneysu, Tim; Moller, Bodo; Paar, Christof
  • 2007 International Conference on Field-Programmable Technology
  • DOI: 10.1109/FPT.2007.4439246

Protecting bus-based hardware IP by secret sharing
conference, January 2008

  • Roy, Jarrod A.; Koushanfar, Farinaz; Markov, Igor L.
  • Proceedings of the 45th annual conference on Design automation - DAC '08
  • DOI: 10.1145/1391469.1391684

Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions
journal, October 2008

  • Guajardo, Jorge; Škorić, Boris; Tuyls, Pim
  • Information Systems Frontiers, Vol. 11, Issue 1
  • DOI: 10.1007/s10796-008-9142-z

Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers
journal, September 2009

  • Holcomb, D. E.; Burleson, W. P.; Fu, K.
  • IEEE Transactions on Computers, Vol. 58, Issue 9
  • DOI: 10.1109/TC.2008.212

A Digital 1.6 pJ/bit Chip Identification Circuit Using Process Variations
journal, January 2008

  • Su, Ying; Holleman, Jeremy; Otis, Brian P.
  • IEEE Journal of Solid-State Circuits, Vol. 43, Issue 1
  • DOI: 10.1109/JSSC.2007.910961

A technique to build a secret key in integrated circuits for identification and authentication applications
conference, January 2004

  • Lee, J. W.; Gassend, B.
  • 2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No.04CH37525)
  • DOI: 10.1109/VLSIC.2004.1346548

Energy Scalable Universal Hashing
journal, December 2005

  • Kaps, J.; Yuksel, K.; Sunar, B.
  • IEEE Transactions on Computers, Vol. 54, Issue 12
  • DOI: 10.1109/TC.2005.195

Extended abstract: The butterfly PUF protecting IP on every FPGA
conference, June 2008

  • Kumar, Sandeep S.; Guajardo, Jorge; Maes, Roel
  • 2008 IEEE International Workshop on Hardware-Oriented Security and Trust (HOST)
  • DOI: 10.1109/HST.2008.4559053

LFSR-based Hashing and Authentication
conference, January 1994


Physical unclonable functions for device authentication and secret key generation
conference, January 2007

  • Suh, G. Edward; Devadas, Srinivas
  • Proceedings of the 44th annual conference on Design automation - DAC '07
  • DOI: 10.1145/1278480.1278484

Physical Unclonable Functions and Public-Key Crypto for FPGA IP Protection
conference, August 2007

  • Guajardo, Jorge; Kumar, Sandeep S.; Schrijen, Geert-Jan
  • 2007 International Conference on Field Programmable Logic and Applications
  • DOI: 10.1109/FPL.2007.4380646