Deterrence of device counterfeiting, cloning, and subversion by substitution using hardware fingerprinting
Abstract
Deterrence of device subversion by substitution may be achieved by including a cryptographic fingerprint unit within a computing device for authenticating a hardware platform of the computing device. The cryptographic fingerprint unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware platform. The PUF circuit is used to generate a PUF value. A key generator is coupled to generate a private key and a public key based on the PUF value while a decryptor is coupled to receive an authentication challenge posed to the computing device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.
- Inventors:
- Issue Date:
- Research Org.:
- Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
- Sponsoring Org.:
- USDOE
- OSTI Identifier:
- 1159918
- Patent Number(s):
- 8848905
- Application Number:
- 12/844,860
- Assignee:
- Sandia Corporation (Albuquerque, NM)
- Patent Classifications (CPCs):
-
H - ELECTRICITY H04 - ELECTRIC COMMUNICATION TECHNIQUE H04L - TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
H - ELECTRICITY H04 - ELECTRIC COMMUNICATION TECHNIQUE H04K - SECRET COMMUNICATION
- DOE Contract Number:
- AC04-94AL85000
- Resource Type:
- Patent
- Country of Publication:
- United States
- Language:
- English
- Subject:
- 97 MATHEMATICS AND COMPUTING
Citation Formats
Hamlet, Jason R, Bauer, Todd M, and Pierson, Lyndon G. Deterrence of device counterfeiting, cloning, and subversion by substitution using hardware fingerprinting. United States: N. p., 2014.
Web.
Hamlet, Jason R, Bauer, Todd M, & Pierson, Lyndon G. Deterrence of device counterfeiting, cloning, and subversion by substitution using hardware fingerprinting. United States.
Hamlet, Jason R, Bauer, Todd M, and Pierson, Lyndon G. Tue .
"Deterrence of device counterfeiting, cloning, and subversion by substitution using hardware fingerprinting". United States. https://www.osti.gov/servlets/purl/1159918.
@article{osti_1159918,
title = {Deterrence of device counterfeiting, cloning, and subversion by substitution using hardware fingerprinting},
author = {Hamlet, Jason R and Bauer, Todd M and Pierson, Lyndon G},
abstractNote = {Deterrence of device subversion by substitution may be achieved by including a cryptographic fingerprint unit within a computing device for authenticating a hardware platform of the computing device. The cryptographic fingerprint unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware platform. The PUF circuit is used to generate a PUF value. A key generator is coupled to generate a private key and a public key based on the PUF value while a decryptor is coupled to receive an authentication challenge posed to the computing device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2014},
month = {9}
}
Works referenced in this record:
Reconfigurable trusted computing in hardware
conference, January 2007
- Eisenbarth, Thomas; Güneysu, Tim; Paar, Christof
- Proceedings of the 2007 ACM workshop on Scalable trusted computing - STC '07
Dynamic Intellectual Property Protection for Reconfigurable Devices
conference, December 2007
- Guneysu, Tim; Moller, Bodo; Paar, Christof
- 2007 International Conference on Field-Programmable Technology
Protecting bus-based hardware IP by secret sharing
conference, January 2008
- Roy, Jarrod A.; Koushanfar, Farinaz; Markov, Igor L.
- Proceedings of the 45th annual conference on Design automation - DAC '08
Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions
journal, October 2008
- Guajardo, Jorge; Škorić, Boris; Tuyls, Pim
- Information Systems Frontiers, Vol. 11, Issue 1
Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers
journal, September 2009
- Holcomb, D. E.; Burleson, W. P.; Fu, K.
- IEEE Transactions on Computers, Vol. 58, Issue 9
A Digital 1.6 pJ/bit Chip Identification Circuit Using Process Variations
journal, January 2008
- Su, Ying; Holleman, Jeremy; Otis, Brian P.
- IEEE Journal of Solid-State Circuits, Vol. 43, Issue 1
A technique to build a secret key in integrated circuits for identification and authentication applications
conference, January 2004
- Lee, J. W.; Gassend, B.
- 2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No.04CH37525)
Energy Scalable Universal Hashing
journal, December 2005
- Kaps, J.; Yuksel, K.; Sunar, B.
- IEEE Transactions on Computers, Vol. 54, Issue 12
Extended abstract: The butterfly PUF protecting IP on every FPGA
conference, June 2008
- Kumar, Sandeep S.; Guajardo, Jorge; Maes, Roel
- 2008 IEEE International Workshop on Hardware-Oriented Security and Trust (HOST)
LFSR-based Hashing and Authentication
conference, January 1994
- Krawczyk, Hugo; Desmedt, Yvo G.
- Advances in Cryptology — CRYPTO ’94, p. 129-139
Physical unclonable functions for device authentication and secret key generation
conference, January 2007
- Suh, G. Edward; Devadas, Srinivas
- Proceedings of the 44th annual conference on Design automation - DAC '07
Physical Unclonable Functions and Public-Key Crypto for FPGA IP Protection
conference, August 2007
- Guajardo, Jorge; Kumar, Sandeep S.; Schrijen, Geert-Jan
- 2007 International Conference on Field Programmable Logic and Applications