UM  > Faculty of Science and Technology
Residential Collegefalse
Status已發表Published
A Weak PUF-Assisted Strong PUF With Inherent Immunity to Modeling Attacks and Ultra-Low BER
Jiahao, Liu1; Yuanzhe, Zhao1; Yan, Zhu1; Chi hang, Chan1; Rui P., Martins2,3
2022-09-21
Source PublicationIEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS
ISSN1549-8328
Volume69Issue:12Pages:4898 - 4907
Abstract

This paper presents a weak PUF-assisted strong PUF that combines the metrics between weak and strong PUFs. Unlike the conventional strong PUFs that rely on the nonlinear combination of a large number of entropy cells for high modeling attacks resilience, the presented strong PUF utilizes unique key streams to bitwise encrypt the raw responses from the conventional strong PUF to facilitate an inherent immunity to modeling attacks thus fulfilling high-level security. A device-specific pseudorandom number generator (P-RNG) configured by a dedicated weak PUF array generates a unique key stream (K). Since the weak PUFs are inherently immune to machine learning or deep learning-based modeling attacks, the final encrypted responses of the proposed strong PUF are also inherently immune to modeling attacks. Moreover, we propose a two-to-one (2-to-1) selection scheme and the digitally-controlled-delay-line (DCDL)- based stability checker to suppress the bit-error-rate (BER) of the weak PUF array and improve the efficiency of the spatial majority voting (SMV)-based error correction scheme, thus achieving high stability for our proposed strong PUF. Fabricated in 65nm CMOS GP technology, the proposed weak PUF-assisted strong PUF shows a high energy efficiency of 3.05 pJ/bit at a 2M bit rate. Meanwhile, it demonstrates an ultra-low average worst-case BER of 8.9 × 10−11 for the temperature range of −20◦C to 120◦C and a supply voltage variation of ±10% with the proposed stabilization schemes. The proposed strong PUF occupies a core area of 0.075mm2.

KeywordBer Device Authentication Energy Efficiency Hardware Security Modeling Attacks Physically Unclonable Function (Puf) Strong Puf Weak Puf
DOI10.1109/TCSI.2022.3206214
Indexed BySCIE
Language英語English
WOS Research AreaEngineering
WOS SubjectEngineering, Electrical & Electronic
WOS IDWOS:000857363500001
PublisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141
Scopus ID2-s2.0-85139447878
Fulltext Access
Citation statistics
Document TypeJournal article
CollectionFaculty of Science and Technology
INSTITUTE OF MICROELECTRONICS
DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING
DEPARTMENT OF ELECTROMECHANICAL ENGINEERING
Corresponding AuthorJiahao, Liu; Yuanzhe, Zhao
Affiliation1.University of Macau, State Key Laboratory of Analog and Mixed-Signal Vlsi, Macau, Macao
2.University of Macau, Faculty of Science and Technology, Department of Electrical and Computer Engineering, Macau, Macao
3.Instituto Superior Técnico, Universidade de Lisboa, Lisboa, 1649-004, Portugal
First Author AffilicationUniversity of Macau
Corresponding Author AffilicationUniversity of Macau
Recommended Citation
GB/T 7714
Jiahao, Liu,Yuanzhe, Zhao,Yan, Zhu,et al. A Weak PUF-Assisted Strong PUF With Inherent Immunity to Modeling Attacks and Ultra-Low BER[J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2022, 69(12), 4898 - 4907.
APA Jiahao, Liu., Yuanzhe, Zhao., Yan, Zhu., Chi hang, Chan., & Rui P., Martins (2022). A Weak PUF-Assisted Strong PUF With Inherent Immunity to Modeling Attacks and Ultra-Low BER. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 69(12), 4898 - 4907.
MLA Jiahao, Liu,et al."A Weak PUF-Assisted Strong PUF With Inherent Immunity to Modeling Attacks and Ultra-Low BER".IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS 69.12(2022):4898 - 4907.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Jiahao, Liu]'s Articles
[Yuanzhe, Zhao]'s Articles
[Yan, Zhu]'s Articles
Baidu academic
Similar articles in Baidu academic
[Jiahao, Liu]'s Articles
[Yuanzhe, Zhao]'s Articles
[Yan, Zhu]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Jiahao, Liu]'s Articles
[Yuanzhe, Zhao]'s Articles
[Yan, Zhu]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.