Abstract
SIMulation Possible, but Laborious (SIMPL) systems are a novel cryptographic concept for physical cryptography that have been suggested in recent years. They can potentially solve inherent vulnerabilities of conventional public-key cryptography that is based on unproven mathematical hypotheses. The security of SIMPL systems rests on their physical unclonability and on the runtime difference between the real-time behavior of the unique SIMPL system and any adversarial simulation or emulation of it. One first circuit-based realization of SIMPL systems via so-called skew SRAMs has previously been discussed in the literature. This paper presents an approach to enhance the security of skew SRAM based SIMPL systems by introducing more complicated and parallel computing behavior taking place in the skew SRAM, which we call multiple-wordline-activation (MWA) skew SRAM. Simulations of the MWA skew SRAM show expected behavior complexity that can be taken advantage of in SIMPL systems to amplify the speed advantage over emulators (functional physical clones) or simulators (digital clones), which plays a key role in the security of SIMPL systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Rührmair, U.: SIMPL systems: on a public key variant of physical unclonable functions. In: IACR Cryptology ePrint Archive, No. 2009/255 (2009)
Rührmair, U., Chen, Q., Stutzmann, M., Lugli, P., Schlichtmann, U., Csaba, G.: Towards electrical, integrated implementations of SIMPL systems. In: Samarati, P., Tunstall, M., Posegga, J., Markantonakis, K., Sauveron, D. (eds.) WISTP 2010. LNCS, vol. 6033, pp. 277–292. Springer, Heidelberg (2010)
Suh, E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Proceedings of the 44th annual Design Automation Conference, DAC 2007, pp. 9−14. ACM Press (2007)
Chen, Q., Csaba, G., Lugli, P., Schlichtmann, U., Rührmair, U.: The bistable ring PUF: a new architecture for strong physical unclonable functions. In: Proceedings of the 2011 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2011, pp. 134−141. IEEE Press (2011)
Kumar, S.S., Guajardo, J., Maes, R., Schrijen, G.J., Tuyls, P.: The butterfly PUF protecting IP on every FPGA. In: Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, HOST2008, pp. 67–70. IEEE Press (2008)
Maes, R., Tuyls, P., Verbauwhede, I.: Intrinsic PUFs from flip-flops on reconfigurable devices. In: 3rd Benelux workshop on information and system security, WISSec 2008, 17 (2008)
Chen, Q., Csaba, G., Lugli, P., Schlichtmann, U., Rührmair, U.: Characterization of the bistable ring PUF. In: Proceedings of the 2012 Design, Automation & Test in Europe Conference & Exhibition, DATE 2012, pp. 1459–1462. IEEE Press (2012)
Beckmann, N., Potkonjak, M.: Hardware-based public-key cryptography with public physically unclonable functions. In: Katzenbeisser, S., Sadeghi, A.-R. (eds.) IH 2009. LNCS, vol. 5806, pp. 206–220. Springer, Heidelberg (2009)
Rührmair, U., Sölter, J., Sehnke, F.: On the foundations of physical unclonable functions. In: IACR Cryptology ePrint Archive, No. 2009/277 (2009)
Potkonjak, M., Meguerdichian, S., Nahapetian, A., Wei, S.: Differential Public Physically Unclonable Functions: Architecture and Applications. In: Proceedings of the 48th annual Design Automation Conference, DAC 2011, pp. 242–247. ACM Press (2011)
Meguerdichian, S., Potkonjak, M.: Matched public PUF: ultra low energy security platform. In: Proceedings of International Symposium on Low Power Electronics and Design, ISLPED 2011, pp. 45−50 (2011)
Chen, Q., Csaba, G., Ju, X., Natarajan, S., Lugli, P., Stutzmann, M., Schlichtmann, U., Rührmair, U.: Analog circuits for physical cryptography. In: Proceedings of the 12th International Symposium on Integrated Circuits, ISIC 2009, pp. 121–124. IEEE Press (2009)
Chen, Q., Csaba, G., Lugli, P., Schlichtmann, U., Stutzmann, M., Rührmair, U.: Circuit-based approaches to SIMPL systems. J. Circuits Syst. Comput. 20(01), 107–123 (2011)
Predictive technology model, Nanoscale Integration and Modeling (NIMO) Group, ASU. http://ptm.asu.edu/
Trimberger, S.: Field-Programmable Gate Array Technology, p. 100. Springer, New York (1994)
Anderson, R.: Security Engineering. John Wiley, New York (2008)
Helfmeier, C., Boit, C., Nedospasov, D., Seifert, J.: Cloning physically unclonable functions. In: Proceedings of the 2013 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2013, pp. 1–6. IEEE Press (2013)
Biddle, P., England, P., Peinado, M., Willman, B.: The darknet and the future of content protection. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol. 2696, pp. 155–176. Springer, Heidelberg (2003)
Sonntag, S., Reinig, H., Linz, S., Pitter, F., Ruhwandl, M.; XB07: a highly reusable crossbar architecture for multiprocessor system on chip (MPSoC). In: IP Based Electronic System Conference, IP 2007, pp. 307−311 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Chen, Q., Rührmair, U., Narayana, S., Sharif, U., Schlichtmann, U. (2015). MWA Skew SRAM Based SIMPL Systems for Public-Key Physical Cryptography. In: Conti, M., Schunter, M., Askoxylakis, I. (eds) Trust and Trustworthy Computing. Trust 2015. Lecture Notes in Computer Science(), vol 9229. Springer, Cham. https://doi.org/10.1007/978-3-319-22846-4_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-22846-4_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-22845-7
Online ISBN: 978-3-319-22846-4
eBook Packages: Computer ScienceComputer Science (R0)