12 research outputs found
Π€ΠΠΠΠ§ΠΠ‘ΠΠΠ― ΠΠ ΠΠΠ’ΠΠΠ ΠΠ€ΠΠ― Π ΠΠΠ©ΠΠ’Π Π¦ΠΠ€Π ΠΠΠ«Π₯ Π£Π‘Π’Π ΠΠΠ‘Π’Π
The article presents the main scientific results and practical achievements obtained by undergraduate and graduate students of Computer Science department of BSUIR under the supervision of professor A.A. Ivaniuk during the period from 2014 to 2018. The original circuit solutions in the field of synthesis of digital physically unclonable functions are presented. The area of physically unclonable functions was first time published in the journal Β«InformaticsΒ» by professor of Software for information technologies department of BSUIR, doctor of technical sciences V.N. Yarmolik, which is a famous domestic scientist in area of reliable digital devices and systems design. New methods and algorithms for unclonable identification and authentication of digital devices are described. The paper also presents the results obtained in the field of random number sequences generation. In addition, the results on the methods of hardware watermarks injection and functional obfuscation of digital devices are given.Π ΡΡΠ°ΡΡΠ΅ ΠΏΡΠ΅Π΄ΡΡΠ°Π²Π»Π΅Π½Ρ ΠΎΡΠ½ΠΎΠ²Π½ΡΠ΅ Π½Π°ΡΡΠ½ΡΠ΅ ΡΠ΅Π·ΡΠ»ΡΡΠ°ΡΡ ΠΈ Π΄ΠΎΡΡΠΈΠΆΠ΅Π½ΠΈΡ, ΠΏΠΎΠ»ΡΡΠ΅Π½Π½ΡΠ΅ Π°ΡΠΏΠΈΡΠ°Π½ΡΠ°ΠΌΠΈ, ΠΌΠ°Π³ΠΈΡΡΡΠ°Π½ΡΠ°ΠΌΠΈ ΠΈ ΡΠΎΠΈΡΠΊΠ°ΡΠ΅Π»ΡΠΌΠΈ ΠΊΠ°ΡΠ΅Π΄ΡΡ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΊΠΈ ΠΠΠ£ΠΠ ΠΏΠΎΠ΄ Π½Π°ΡΡΠ½ΡΠΌ ΡΡΠΊΠΎΠ²ΠΎΠ΄ΡΡΠ²ΠΎΠΌ ΠΏΡΠΎΡΠ΅ΡΡΠΎΡΠ° Π.Π. ΠΠ²Π°Π½ΡΠΊΠ° Π² ΠΏΠ΅ΡΠΈΠΎΠ΄ Ρ 2014 ΠΏΠΎ 2018 Π³ΠΎΠ΄. ΠΡΠΈΠ²Π΅Π΄Π΅Π½Ρ ΠΎΡΠΈΠ³ΠΈΠ½Π°Π»ΡΠ½ΡΠ΅ ΡΡ
Π΅ΠΌΠΎΡΠ΅Ρ
Π½ΠΈΡΠ΅ΡΠΊΠΈΠ΅ ΡΠ΅ΡΠ΅Π½ΠΈΡ Π² ΠΎΠ±Π»Π°ΡΡΠΈ ΡΠΈΠ½ΡΠ΅Π·Π° ΡΠΈΡΡΠΎΠ²ΡΡ
ΡΠΈΠ·ΠΈΡΠ΅ΡΠΊΠΈ Π½Π΅ΠΊΠ»ΠΎΠ½ΠΈΡΡΠ΅ΠΌΡΡ
ΡΡΠ½ΠΊΡΠΈΠΉ. ΠΠΏΠ΅ΡΠ²ΡΠ΅ ΠΏΡΠΎΠ±Π»Π΅ΠΌΠ°ΡΠΈΠΊΠ° ΡΠΈΠ·ΠΈΡΠ΅ΡΠΊΠΈ Π½Π΅ΠΊΠ»ΠΎΠ½ΠΈΡΡΠ΅ΠΌΡΡ
ΡΡΠ½ΠΊΡΠΈΠΉ Π±ΡΠ»Π° ΠΎΠΏΡΠ±Π»ΠΈΠΊΠΎΠ²Π°Π½Π° Π² 2011 Π³ΠΎΠ΄Ρ Π² ΠΆΡΡΠ½Π°Π»Π΅ Β«ΠΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΊΠ°Β» ΠΏΡΠΎΡΠ΅ΡΡΠΎΡΠΎΠΌ ΠΊΠ°ΡΠ΅Π΄ΡΡ ΠΠΠΠ’ ΠΠΠ£ΠΠ Π΄.Ρ.Π½., ΠΏΡΠΎΡΠ΅ΡΡΠΎΡΠΎΠΌ Π.Π. Π―ΡΠΌΠΎΠ»ΠΈΠΊΠΎΠΌ, ΡΠ²Π»ΡΡΡΠΈΠΌΡΡ ΠΈΠ·Π²Π΅ΡΡΠ½ΡΠΌ ΠΎΡΠ΅ΡΠ΅ΡΡΠ²Π΅Π½Π½ΡΠΌ ΡΡΠ΅Π½ΡΠΌ Π² ΠΎΠ±Π»Π°ΡΡΠΈ ΠΏΡΠΎΠ΅ΠΊΡΠΈΡΠΎΠ²Π°Π½ΠΈΡ Π½Π°Π΄Π΅ΠΆΠ½ΡΡ
ΡΠΈΡΡΠΎΠ²ΡΡ
ΡΡΡΡΠΎΠΉΡΡΠ² ΠΈ ΡΠΈΡΡΠ΅ΠΌ. Π Π΄Π°Π½Π½ΠΎΠΉ ΡΡΠ°ΡΡΠ΅ ΠΏΡΠΈΠ²Π΅Π΄Π΅Π½Ρ Π½ΠΎΠ²ΡΠ΅ ΠΌΠ΅ΡΠΎΠ΄Ρ ΠΈ Π°Π»Π³ΠΎΡΠΈΡΠΌΡ Π½Π΅ΠΊΠ»ΠΎΠ½ΠΈΡΡΠ΅ΠΌΠΎΠΉ ΠΈΠ΄Π΅Π½ΡΠΈΡΠΈΠΊΠ°ΡΠΈΠΈ ΠΈ Π°ΡΡΠ΅Π½ΡΠΈΡΠΈΠΊΠ°ΡΠΈΠΈ ΡΠΈΡΡΠΎΠ²ΡΡ
ΡΡΡΡΠΎΠΉΡΡΠ². ΠΡΠ΅Π΄ΡΡΠ°Π²Π»Π΅Π½Ρ ΡΠ΅Π·ΡΠ»ΡΡΠ°ΡΡ, ΠΏΠΎΠ»ΡΡΠ΅Π½Π½ΡΠ΅ Π² ΠΎΠ±Π»Π°ΡΡΠΈ Π³Π΅Π½Π΅ΡΠΈΡΠΎΠ²Π°Π½ΠΈΡ ΡΠ»ΡΡΠ°ΠΉΠ½ΡΡ
ΡΠΈΡΠ»ΠΎΠ²ΡΡ
ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠ΅ΠΉ. ΠΡΠΎΠΌΠ΅ ΡΠΎΠ³ΠΎ, ΠΏΡΠΈΠ²Π΅Π΄Π΅Π½Ρ ΡΠ΅Π·ΡΠ»ΡΡΠ°ΡΡ ΠΏΠΎ ΠΌΠ΅ΡΠΎΠ΄Π°ΠΌ ΡΠ΅Π°Π»ΠΈΠ·Π°ΡΠΈΠΈ Π°ΠΏΠΏΠ°ΡΠ°ΡΠ½ΡΡ
Π²ΠΎΠ΄ΡΠ½ΡΡ
Π·Π½Π°ΠΊΠΎΠ² ΠΈ ΡΡΠ½ΠΊΡΠΈΠΎΠ½Π°Π»ΡΠ½ΠΎΠΉ ΠΎΠ±ΡΡΡΠΊΠ°ΡΠΈΠΈ ΡΠΈΡΡΠΎΠ²ΡΡ
ΡΡΡΡΠΎΠΉΡΡΠ²
Π‘ΠΈΠ½ΡΠ΅Π· ΡΠΈΠΌΠΌΠ΅ΡΡΠΈΡΠ½ΡΡ ΠΏΡΡΠ΅ΠΉ ΡΠΈΠ·ΠΈΡΠ΅ΡΠΊΠΈ Π½Π΅ΠΊΠ»ΠΎΠ½ΠΈΡΡΠ΅ΠΌΠΎΠΉ ΡΡΠ½ΠΊΡΠΈΠΈ ΡΠΈΠΏΠ° Π°ΡΠ±ΠΈΡΡ Π½Π° FPGA
Π ΡΡΠ°ΡΡΠ΅ ΠΏΡΠ΅Π΄Π»Π°Π³Π°Π΅ΡΡΡ Π½ΠΎΠ²Π°Ρ Π°ΡΡ
ΠΈΡΠ΅ΠΊΡΡΡΠ° Π·Π²Π΅Π½ΡΠ΅Π² ΡΠΈΠΌΠΌΠ΅ΡΡΠΈΡΠ½ΡΡ
ΠΏΡΡΠ΅ΠΉ Π€ΠΠ€ ΡΠΈΠΏΠ° Π°ΡΠ±ΠΈΡΡ, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠ°Ρ ΡΡΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎ ΠΏΡΠΈΠΌΠ΅Π½ΡΡΡ ΡΠ΅ΡΡΡΡΡ LUT-Π±Π»ΠΎΠΊΠΎΠ² ΡΠ°Π·Π»ΠΈΡΠ½ΡΡ
ΠΊΡΠΈΡΡΠ°Π»Π»ΠΎΠ² FPGA
Π‘ΠΈΠ½ΡΠ΅Π· ΡΠΈΠΌΠΌΠ΅ΡΡΠΈΡΠ½ΡΡ ΠΏΡΡΠ΅ΠΉ ΡΠΈΠ·ΠΈΡΠ΅ΡΠΊΠΈ Π½Π΅ΠΊΠ»ΠΎΠ½ΠΈΡΡΠ΅ΠΌΠΎΠΉ ΡΡΠ½ΠΊΡΠΈΠΈ ΡΠΈΠΏΠ° Π°ΡΠ±ΠΈΡΡ Π½Π° FPGA
Physical cryptography is one of the current trends among the existing methods of protecting digital devices from illegal access. Circuit design solutions in physical cryptography are called digital physically unclonable functions (PUFs), which to be implemented ensure the uniqueness, non-reproducibility (non-cloning) of the protected digital device. In addition, PUFs should be efficient as hardware resources. The existing implementations of the arbiter PUF are based on the synthesis of configurable symmetric paths, when each link is a pair of two-input multiplexers providing two configurations of test signal translation: direct and cross. In order to build a single link on FPGA, it is necessary to use two built-in LUT-blocks, providing the implementation of two multiplexers, meanwhile the hardware resources of LUT-blocks are not fully utilized. The article presents a new architecture of symmetric paths of the arbiter PUF, allowing efficient use of hardware resources of LUT-blocks for various FPGA families.Π€ΠΈΠ·ΠΈΡΠ΅ΡΠΊΠ°Ρ ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΡ ΡΠ²Π»ΡΠ΅ΡΡΡ ΠΎΠ΄Π½ΠΈΠΌ ΠΈΠ· Π°ΠΊΡΡΠ°Π»ΡΠ½ΡΡ
Π½Π°ΠΏΡΠ°Π²Π»Π΅Π½ΠΈΠΉ ΡΡΠ΅Π΄ΠΈ ΡΡΡΠ΅ΡΡΠ²ΡΡΡΠΈΡ
ΠΌΠ΅ΡΠΎΠ΄ΠΎΠ² Π·Π°ΡΠΈΡΡ ΡΠΈΡΡΠΎΠ²ΡΡ
ΡΡΡΡΠΎΠΉΡΡΠ² ΠΎΡ Π½Π΅Π»Π΅Π³Π°Π»ΡΠ½ΠΎΠ³ΠΎ Π΄ΠΎΡΡΡΠΏΠ°. Π‘Ρ
Π΅ΠΌΠΎΡΠ΅Ρ
Π½ΠΈΡΠ΅ΡΠΊΠΈΠ΅ ΡΠ΅ΡΠ΅Π½ΠΈΡ, Π»Π΅ΠΆΠ°ΡΠΈΠ΅ Π² ΠΎΡΠ½ΠΎΠ²Π΅ ΡΠΈΠ·ΠΈΡΠ΅ΡΠΊΠΎΠΉ ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΠΈ, ΠΏΠΎΠ»ΡΡΠΈΠ»ΠΈ Π½Π°Π·Π²Π°Π½ΠΈΠ΅ ΡΠΈΡΡΠΎΠ²ΡΡ
ΡΠΈΠ·ΠΈΡΠ΅ΡΠΊΠΈ Π½Π΅ΠΊΠ»ΠΎΠ½ΠΈΡΡΠ΅ΠΌΡΡ
ΡΡΠ½ΠΊΡΠΈΠΉ (Π€ΠΠ€), ΡΠ΅Π°Π»ΠΈΠ·Π°ΡΠΈΡ ΠΊΠΎΡΠΎΡΡΡ
ΠΎΠ±Π΅ΡΠΏΠ΅ΡΠΈΠ²Π°Π΅Ρ ΡΠ½ΠΈΠΊΠ°Π»ΡΠ½ΠΎΡΡΡ, Π½Π΅Π²ΠΎΡΠΏΡΠΎΠΈΠ·Π²ΠΎΠ΄ΠΈΠΌΠΎΡΡΡ (Π½Π΅ΠΊΠ»ΠΎΠ½ΠΈΡΡΠ΅ΠΌΠΎΡΡΡ) Π·Π°ΡΠΈΡΠ°Π΅ΠΌΠΎΠ³ΠΎ ΡΠΈΡΡΠΎΠ²ΠΎΠ³ΠΎ ΡΡΡΡΠΎΠΉΡΡΠ²Π°. ΠΡΠΎΠΌΠ΅ ΡΠΎΠ³ΠΎ, Π€ΠΠ€ ΡΡΡΠ΅ΠΊΡΠΈΠ²Π½Ρ Ρ ΡΠΎΡΠΊΠΈ Π·ΡΠ΅Π½ΠΈΡ Π°ΠΏΠΏΠ°ΡΠ°ΡΠ½ΡΡ
ΡΠ΅ΡΡΡΡΠΎΠ² ΠΏΡΠΈ ΠΈΡ
ΡΠ΅Π°Π»ΠΈΠ·Π°ΡΠΈΠΈ. Π‘ΡΡΠ΅ΡΡΠ²ΡΡΡΠΈΠ΅ Π€ΠΠ€ ΡΠΈΠΏΠ° Π°ΡΠ±ΠΈΡΡ ΠΎΡΠ½ΠΎΠ²Π°Π½Ρ Π½Π° ΡΠΈΠ½ΡΠ΅Π·Π΅ ΠΊΠΎΠ½ΡΠΈΠ³ΡΡΠΈΡΡΠ΅ΠΌΡΡ
ΡΠΈΠΌΠΌΠ΅ΡΡΠΈΡΠ½ΡΡ
ΠΏΡΡΠ΅ΠΉ, ΠΊΠ°ΠΆΠ΄ΠΎΠ΅ Π·Π²Π΅Π½ΠΎ ΠΊΠΎΡΠΎΡΡΡ
ΠΏΡΠ΅Π΄ΡΡΠ°Π²Π»ΡΠ΅Ρ ΡΠΎΠ±ΠΎΠΉ ΠΏΠ°ΡΡ Π΄Π²ΡΡ
Π²Ρ
ΠΎΠ΄ΠΎΠ²ΡΡ
ΠΌΡΠ»ΡΡΠΈΠΏΠ»Π΅ΠΊΡΠΎΡΠΎΠ², ΠΎΠ±Π΅ΡΠΏΠ΅ΡΠΈΠ²Π°ΡΡΠΈΡ
Π΄Π²Π΅ ΠΊΠΎΠ½ΡΠΈΠ³ΡΡΠ°ΡΠΈΠΈ ΡΡΠ°Π½ΡΠ»ΡΡΠΈΠΈ ΡΠ΅ΡΡΠΎΠ²ΡΡ
ΡΠΈΠ³Π½Π°Π»ΠΎΠ²: ΠΏΡΡΠΌΡΡ ΠΈ ΠΏΠ΅ΡΠ΅ΠΊΡΠ΅ΡΡΠ½ΡΡ. ΠΠ»Ρ ΠΏΠΎΡΡΡΠΎΠ΅Π½ΠΈΡ Π½Π° ΠΏΡΠΎΠ³ΡΠ°ΠΌΠΌΠΈΡΡΠ΅ΠΌΠΎΠΉ Π»ΠΎΠ³ΠΈΡΠ΅ΡΠΊΠΎΠΉ ΠΈΠ½ΡΠ΅Π³ΡΠ°Π»ΡΠ½ΠΎΠΉ ΡΡ
Π΅ΠΌΠ΅ (ΠΠΠΠ‘) ΡΠΈΠΏΠ° FPGA ΠΎΠ΄Π½ΠΎΠ³ΠΎ Π·Π²Π΅Π½Π° Π½Π΅ΠΎΠ±Ρ
ΠΎΠ΄ΠΈΠΌΠΎ ΠΏΡΠΈΠΌΠ΅Π½Π΅Π½ΠΈΠ΅ Π΄Π²ΡΡ
Π²ΡΡΡΠΎΠ΅Π½Π½ΡΡ
LUT-Π±Π»ΠΎΠΊΠΎΠ², ΠΎΠ±Π΅ΡΠΏΠ΅ΡΠΈΠ²Π°ΡΡΠΈΡ
ΡΠ΅Π°Π»ΠΈΠ·Π°ΡΠΈΡ Π΄Π²ΡΡ
ΠΌΡΠ»ΡΡΠΈΠΏΠ»Π΅ΠΊΡΠΎΡΠΎΠ², ΠΏΡΠΈ ΡΡΠΎΠΌ ΡΠ΅ΡΡΡΡΡ LUT-Π±Π»ΠΎΠΊΠΎΠ² ΠΈΡΠΏΠΎΠ»ΡΠ·ΡΡΡΡΡ Π½Π΅ ΠΏΠΎΠ»Π½ΠΎΡΡΡΡ. Π ΡΡΠ°ΡΡΠ΅ ΠΏΡΠ΅Π΄Π»Π°Π³Π°Π΅ΡΡΡ Π½ΠΎΠ²Π°Ρ Π°ΡΡ
ΠΈΡΠ΅ΠΊΡΡΡΠ° Π·Π²Π΅Π½ΡΠ΅Π² ΡΠΈΠΌΠΌΠ΅ΡΡΠΈΡΠ½ΡΡ
ΠΏΡΡΠ΅ΠΉ Π€ΠΠ€ ΡΠΈΠΏΠ° Π°ΡΠ±ΠΈΡΡ, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠ°Ρ ΡΡΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎ ΠΏΡΠΈΠΌΠ΅Π½ΡΡΡ ΡΠ΅ΡΡΡΡΡ LUT-Π±Π»ΠΎΠΊΠΎΠ² ΡΠ°Π·Π»ΠΈΡΠ½ΡΡ
ΠΊΡΠΈΡΡΠ°Π»Π»ΠΎΠ² FPGA
An Efficient Authentication Protocol for Smart Grid Communication Based on On-Chip-Error-Correcting Physical Unclonable Function
Security has become a main concern for the smart grid to move from research
and development to industry. The concept of security has usually referred to
resistance to threats by an active or passive attacker. However, since smart
meters (SMs) are often placed in unprotected areas, physical security has
become one of the important security goals in the smart grid. Physical
unclonable functions (PUFs) have been largely utilized for ensuring physical
security in recent years, though their reliability has remained a major problem
to be practically used in cryptographic applications. Although fuzzy extractors
have been considered as a solution to solve the reliability problem of PUFs,
they put a considerable computational cost to the resource-constrained SMs. To
that end, we first propose an on-chip-error-correcting (OCEC) PUF that
efficiently generates stable digits for the authentication process. Afterward,
we introduce a lightweight authentication protocol between the SMs and
neighborhood gateway (NG) based on the proposed PUF. The provable security
analysis shows that not only the proposed protocol can stand secure in the
Canetti-Krawczyk (CK) adversary model but also provides additional security
features. Also, the performance evaluation demonstrates the significant
improvement of the proposed scheme in comparison with the state-of-the-art
FPGA Based Arbiter Physical Unclonable Function Implementation with Reduced Hardware Overhead
The paper presents a new architecture of symmetric paths of the arbiter PUF, providing efficient use of the hardware resources of LUT blocks for various Xilinx Artix-7 FPGA family
ΠΡΡΠ»Π΅Π΄ΠΎΠ²Π°Π½ΠΈΠ΅ Ρ Π°ΡΠ°ΠΊΡΠ΅ΡΠΈΡΡΠΈΠΊ ΡΠΈΠ·ΠΈΡΠ΅ΡΠΊΠΈ Π½Π΅ΠΊΠ»ΠΎΠ½ΠΈΡΡΠ΅ΠΌΡΡ ΡΡΠ½ΠΊΡΠΈΠΉ, ΠΏΠΎΡΡΡΠΎΠ΅Π½Π½ΡΡ Π½Π° Π±Π°Π·Π΅ ΠΊΠΎΠΌΠ±ΠΈΠ½ΠΈΡΠΎΠ²Π°Π½Π½ΠΎΠ³ΠΎ Π³Π΅Π½Π΅ΡΠ°ΡΠΎΡΠ°
ΠΠ°Π½Π½Π°Ρ ΡΠ°Π±ΠΎΡΠ° Π½Π°ΠΏΡΠ°Π²Π»Π΅Π½Π° Π½Π° ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°Π½ΠΈΠ΅ Ρ
Π°ΡΠ°ΠΊΡΠ΅ΡΠΈΡΡΠΈΠΊ ΡΠ»ΡΡΠ°ΠΉΠ½ΠΎΡΡΠΈ ΠΈ ΡΠ½ΠΈΠΊΠ°Π»ΡΠ½ΠΎΡΡΠΈ ΡΠΈΠ·ΠΈΡΠ΅ΡΠΊΠΈ Π½Π΅ΠΊΠ»ΠΎΠ½ΠΈΡΡΠ΅ΠΌΡΡ
ΡΡΠ½ΠΊΡΠΈΠΉ, ΠΏΠΎΡΡΡΠΎΠ΅Π½Π½ΡΡ
Π½Π° ΠΎΡΠ½ΠΎΠ²Π΅ ΡΡ
Π΅ΠΌΡ ΠΊΠΎΠΌΠ±ΠΈΠ½ΠΈΡΠΎΠ²Π°Π½Π½ΠΎΠ³ΠΎ Π³Π΅Π½Π΅ΡΠ°ΡΠΎΡΠ°. Π ΡΠ°Π±ΠΎΡΠ΅ ΡΠ°ΡΡΠΌΠΎΡΡΠ΅Π½Ρ ΡΡΡΡΠΊΡΡΡΠ° ΡΡ
Π΅ΠΌΡ ΠΊΠΎΠΌΠ±ΠΈΠ½ΠΈΡΠΎΠ²Π°Π½Π½ΠΎΠ³ΠΎ Π³Π΅Π½Π΅ΡΠ°ΡΠΎΡΠ° ΠΈ ΡΠ΅ΠΆΠΈΠΌΡ Π΅Π³ΠΎ ΡΠ°Π±ΠΎΡΡ. ΠΡΠ΅Π΄ΡΡΠ°Π²Π»Π΅Π½Ρ ΡΠΊΡΠΏΠ΅ΡΠΈΠΌΠ΅Π½ΡΠ°Π»ΡΠ½ΡΠ΅ ΡΠ΅Π·ΡΠ»ΡΡΠ°ΡΡ, ΠΏΠΎΠ»ΡΡΠ΅Π½Π½ΡΠ΅ ΠΏΡΠΈ ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°Π½ΠΈΠΈ Ρ
Π°ΡΠ°ΠΊΡΠ΅ΡΠΈΡΡΠΈΠΊ ΡΠ°ΡΡΠΌΠ°ΡΡΠΈΠ²Π°Π΅ΠΌΠΎΠ³ΠΎ ΡΠΈΠΏΠ° ΡΠΈΠ·ΠΈΡΠ΅ΡΠΊΠΈ Π½Π΅ΠΊΠ»ΠΎΠ½ΠΈΡΡΠ΅ΠΌΡΡ
ΡΡΠ½ΠΊΡΠΈΠΉ Π½Π° ΡΠ°Π·Π»ΠΈΡΠ½ΡΡ
ΡΠΊΠ·Π΅ΠΌΠΏΠ»ΡΡΠ°Ρ
ΠΏΡΠΎΠ³ΡΠ°ΠΌΠΌΠΈΡΡΠ΅ΠΌΡΡ
Π»ΠΎΠ³ΠΈΡΠ΅ΡΠΊΠΈΡ
ΠΈΠ½ΡΠ΅Π³ΡΠ°Π»ΡΠ½ΡΡ
ΡΡ
Π΅ΠΌ - ΠΠΠΠ‘ Xilinx ΡΠ΅ΠΌΠ΅ΠΉΡΡΠ²Π° Zynq7000
Proof-of-PUF enabled blockchain: concurrent data and device security for internet-of-energy
A detailed review on the technological aspects of Blockchain and Physical Unclonable Functions (PUFs) is presented in this article. It stipulates an emerging concept of Blockchain that integrates hardware security primitives via PUFs to solve bandwidth, integration, scalability, latency, and energy requirements for the Internet-of-Energy (IoE) systems. This hybrid approach, hereinafter termed as PUFChain, provides device and data provenance which records data origins, history of data generation and processing, and clone-proof device identification and authentication, thus possible to track the sources and reasons of any cyber attack. In addition to this, we review the key areas of design, development, and implementation, which will give us the insight on seamless integration with legacy IoE systems, reliability, cyber resilience, and future research challenges
Combined Random Number Generator on Programmable Logic Integrated Circuits
ΠΠΎΠΊΠ°Π·Π°Π½Π° ΠΏΡΠ°ΠΊΡΠΈΡΠ΅ΡΠΊΠ°Ρ Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎΡΡΡ ΡΠ΅Π°Π»ΠΈΠ·Π°ΡΠΈΠΈ Π³Π΅Π½Π΅ΡΠ°ΡΠΎΡΠΎΠ² ΡΠ»ΡΡΠ°ΠΉΠ½ΡΡ
ΡΠΈΡΠ΅Π» Π½Π° ΠΏΡΠΎΠ³ΡΠ°ΠΌΠΌΠΈΡΡΠ΅ΠΌΡΡ
Π»ΠΎΠ³ΠΈΡΠ΅ΡΠΊΠΈΡ
ΠΈΠ½ΡΠ΅Π³ΡΠ°Π»ΡΠ½ΡΡ
ΡΡ
Π΅ΠΌΠ°Ρ
(Π°Π½Π³Π». FPGA β field programmable gate arrays) ΠΏΡΡΠ΅ΠΌ ΠΊΠΎΠΌΠ±ΠΈΠ½ΠΈΡΠΎΠ²Π°Π½ΠΈΡ ΡΠ°Π·Π»ΠΈΡΠ½ΡΡ
ΡΠΈΠ·ΠΈΡΠ΅ΡΠΊΠΈ Π½Π΅ΠΊΠ»ΠΎΠ½ΠΈΡΡΠ΅ΠΌΡΡ
ΡΡΠ½ΠΊΡΠΈΠΉ. ΠΡΠ΅Π΄Π»ΠΎΠΆΠ΅Π½Π° ΠΊΠΎΠΌΠΏΠ°ΠΊΡΠ½Π°Ρ ΠΈ ΠΌΠ°ΡΡΡΠ°Π±ΠΈΡΡΠ΅ΠΌΠ°Ρ ΡΡ
Π΅ΠΌΠ° ΡΠΈΡΡΠΎΠ²ΠΎΠ³ΠΎ ΠΈΡΡΠΎΡΠ½ΠΈΠΊΠ° ΡΠ»ΡΡΠ°ΠΉΠ½ΡΡ
ΡΠΈΡΠ΅Π» Π½Π° ΠΎΡΠ½ΠΎΠ²Π΅ Π°ΡΠΈΠ½Ρ
ΡΠΎΠ½Π½ΠΎΠ³ΠΎ ΡΡΠΈΠ³Π³Π΅ΡΠ° D-ΡΠΈΠΏΠ°, ΡΠΎΡΠ΅ΡΠ°ΡΡΠ°Ρ Π² ΡΠ΅Π±Π΅ Ρ
Π°ΡΠ°ΠΊΡΠ΅ΡΠΈΡΡΠΈΠΊΠΈ ΡΠΈΠ·ΠΈΡΠ΅ΡΠΊΠΈ Π½Π΅ΠΊΠ»ΠΎΠ½ΠΈΡΡΠ΅ΠΌΡΡ
ΡΡΠ½ΠΊΡΠΈΠΉ ΠΊΠ°ΠΊ ΡΡΠ°ΡΠΈΡΠ΅ΡΠΊΠΎΠΉ ΠΏΠ°ΠΌΡΡΠΈ, ΡΠ°ΠΊ ΠΈ ΠΊΠΎΠ»ΡΡΠ΅Π²ΠΎΠ³ΠΎ ΠΎΡΡΠΈΠ»Π»ΡΡΠΎΡΠ°. Π ΠΎΡΠ»ΠΈΡΠΈΠ΅
ΠΎΡ ΡΡΡΠ΅ΡΡΠ²ΡΡΡΠΈΡ
Π³Π΅Π½Π΅ΡΠ°ΡΠΎΡΠΎΠ² ΡΠ»ΡΡΠ°ΠΉΠ½ΡΡ
ΡΠΈΡΠ΅Π» ΠΏΡΠ΅Π΄Π»ΠΎΠΆΠ΅Π½Π½Π°Ρ ΡΡ
Π΅ΠΌΠ° ΠΌΠΎΠΆΠ΅Ρ Π±ΡΡΡ ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°Π½Π° Π΄Π»Ρ ΡΠ΅ΡΠ΅Π½ΠΈΡ
Π·Π°Π΄Π°ΡΠΈ Π½Π΅ΠΊΠ»ΠΎΠ½ΠΈΡΡΠ΅ΠΌΠΎΠΉ ΠΈΠ΄Π΅Π½ΡΠΈΡΠΈΠΊΠ°ΡΠΈΠΈ ΡΠΈΡΡΠΎΠ²ΡΡ
ΡΡΡΡΠΎΠΉΡΡΠ². ΠΡΠΈΠ²Π΅Π΄Π΅Π½Ρ ΡΠΊΡΠΏΠ΅ΡΠΈΠΌΠ΅Π½ΡΠ°Π»ΡΠ½ΡΠ΅ ΡΠ΅Π·ΡΠ»ΡΡΠ°ΡΡ,
ΠΏΠΎΠ»ΡΡΠ΅Π½Π½ΡΠ΅ ΠΏΡΠΈ ΡΠ΅Π°Π»ΠΈΠ·Π°ΡΠΈΠΈ ΠΏΡΠ΅Π΄Π»ΠΎΠΆΠ΅Π½Π½ΠΎΠΉ ΡΡ
Π΅ΠΌΡ Π³Π΅Π½Π΅ΡΠ°ΡΠΎΡΠ° Π½Π° ΠΎΡΠ½ΠΎΠ²Π΅ ΠΏΡΠΎΠ³ΡΠ°ΠΌΠΌΠΈΡΡΠ΅ΠΌΡΡ
Π»ΠΎΠ³ΠΈΡΠ΅ΡΠΊΠΈΡ
ΠΈΠ½ΡΠ΅Π³ΡΠ°Π»ΡΠ½ΡΡ
ΡΡ
Π΅ΠΌ ΡΠΈΠΏΠ° FPGA Xilinx Zynq. ΠΠΏΠΈΡΠ°Π½Ρ ΠΎΡΠ½ΠΎΠ²Π½ΡΠ΅ ΡΠ΅ΠΆΠΈΠΌΡ ΡΡΠ½ΠΊΡΠΈΠΎΠ½ΠΈΡΠΎΠ²Π°Π½ΠΈΡ, Π²Π΅ΡΠΎΡΡΠ½ΠΎΡΡΠ½ΡΠ΅
ΠΈ ΡΡΠ°ΡΠΈΡΡΠΈΡΠ΅ΡΠΊΠΈΠ΅ Ρ
Π°ΡΠ°ΠΊΡΠ΅ΡΠΈΡΡΠΈΠΊΠΈ ΡΠΈΡΠ»ΠΎΠ²ΡΡ
ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠ΅ΠΉ, Π³Π΅Π½Π΅ΡΠΈΡΡΠ΅ΠΌΡΡ
ΠΏΡΠ΅Π΄Π»ΠΎΠΆΠ΅Π½Π½ΠΎΠΉ ΡΡ
Π΅ΠΌΠΎΠΉ
Konzeption und Umsetzung einer mobilen Applikation zur Validierung von f\"alschungssicheren Produktlabeln
Due to increasing numbers of product piracy worldwide, a cost-effective
method for verifying the origin of a product is to be developed. For this
purpose, a certificate of authenticity can be created using precisely
measurable, unique properties of special physical objects that are difficult to
reconstruct. In the context of the present work, this is a counterfeit-proof
label composed of randomly distributed gold nanospheres or rods in a
semi-transparent material. The characteristic positioning of the label's
elements can be precisely measured using a smartphone's camera and additional
technologies. This can create an offline usable verification method for the
general public without the need for an existing network connection. The present
work provides a first part of the proof of concept that such a system and
especially the associated algorithmic computation method can be implemented and
efficiently used in a mobile application. In addition, a method suitable in
practice for transmitting and securing the required information is determined
in each case. Furthermore, the results of the validation of counterfeit-proof
product labels are analyzed in detail and existing weaknesses are pointed out.
-- Auf Grund weltweit steigender Zahlen der Produktpiraterie soll ein
kosteng\"unstiges Verfahren zur Verifizierung der Herkunft eines Produktes
entwickelt werden. Daf\"ur l\"asst sich durch exakt messbare, einzigartige,
jedoch schwer rekonstruierbare Eigenschaften spezieller physischer Objekte ein
Echtheitszertifikat kreieren. Dieses ist im Kontext der vorliegenden Arbeit ein
f\"alschungssicheres Label, das sich in einem semi-transparenten Material aus
zuf\"allig verteilten Goldnanok\"ugelchen oder -st\"abchen zusammensetzt. Die
charakteristischen Positionierungen der Elemente des Labels lassen sich mit der
Kamera eines Smartphones und zus\"atzlichen Technologien pr\"azise messen.
Dadurch kann f\"ur die breite Bev\"olkerung ohne die Notwendigkeit einer
bestehenden Netzwerkverbindung ein offline verwendbares Verifikationsverfahren
erschaffen werden. Die vorliegende Arbeit liefert einen ersten Teil des
Machbarkeitsnachweises, dass ein derartiges System und insbesondere das damit
einhergehende algorithmische Berechnungsverfahren in einer mobilen Applikation
implementier -- und effizient einsetzbar ist. Zudem wird je eine in der Praxis
geeignete Methode zur \"Ubermittlung und Sicherung der ben\"otigten
Informationen eruiert. Des Weiteren werden die Resultate der Validierung von
f\"alschungssicheren Produktlabeln ausf\"uhrlich analysiert und vorhandene
Schw\"achen aufgezeigt.Comment: Thesis for: Informatik Bachelor; Advisor: Dr. Markus Friedrich, Dr.
Sebastian Feld, Prof. Dr. Dr. Ulrich R\"uhrmair; in Germa
Reliable and modeling attack resistant authentication of Arbiter PUF in FPGA implementation with trinary quadruple response
Field programmable gate array (FPGA) is a potential hotbed for malicious and counterfeit hardware infiltration. Arbiter-based physical unclonable function (A-PUF) has been widely regarded as a suitable lightweight security primitive for FPGA bitstream encryption and device authentication. Unfortunately, the metastability of flip-flop gives rise to poor A-PUF reliability in FPGA implementation. Its linear additive path delays are also vulnerable to modeling attacks. Most reliability enhancement techniques tend to increase the response predictability and ease machine learning attacks. This paper presents a robust device authentication method based on the FPGA implementation of a reliability enhanced A-PUF with trinary digit (trit) quadruple responses. A two flip-flop arbiter is used to produce a trit for metastability detection. By considering the ordered responses to all four combinations of first and last challenge bits, each quadruple response can be compressed into a quadbit that represents one of the five classes of trit quadruple response with greater reproducibility. This challenge-response quadruple classification not only greatly reduces the burden of error correction at the device but also enables a precise A-PUF model to be built at the server without having to store the complete challenge-response pair (CRP) set for authentication. Besides, the real challenge to the A-PUF is generated internally by a lossy, nonlinear, and irreversible maximum length signature generator at both the server and device sides to prevent the naked CRP from being machine learned by the attacker. The A-PUF with short repetition code of length five has been tested to achieve a reliability of 1.0 over the full operating temperature range of the target FPGA board with lower hardware resource utilization than other modeling attack resilient strong PUFs. The proposed authentication protocol has also been experimentally evaluated to be practically secure against various machine learning attacks including evolutionary strategy covariance matrix adaptation.Ministry of Education (MOE)Accepted versionThis work was supported by the Singapore Ministry of Education Academic Research Fund (AcRF) Tier II under Grant MOE 2015-T2-2-013. The associate editor coordinating the review of this manuscript and approving it for publication was Dr. Eduard A. Jorswieck. (Corresponding authors: Siarhei S. Zalivaka; Chip-Hong Chang.