Physical unclonable functions and public-key CRYPTO for FPGA IP protection

被引:128
作者
Guajardo, Jorge [1 ]
Kumar, Sandeep S. [1 ]
Schrijen, Geert-Jan [1 ]
Tuyls, Pim [1 ]
机构
[1] Philips Res Labs, Eindhoven, Netherlands
来源
2007 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, VOLS 1 AND 2 | 2007年
关键词
D O I
10.1109/FPL.2007.4380646
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In recent years, IP protection of FPGA hardware designs has become a requirement for many IP vendors. To this end solutions have been proposed based on the idea of bitstream encryption, symmetric-key primitives, and the use of Physical Unclonable Functions (PUFs). In this paper, we propose new protocols for the IP protection problem on FPGAs based on public-key (PK) cryptography, analyze the advantages and costs of such an approach, and describe a PUF intrinsic to cur-rent FPGAs based on SRAM properties. A major advantage of using PK-based protocols is that they do not require the private key stored in the FPGA to leave the device, thus increasing security. This added security comes at the cost of additional hardware resources but it does not cause significant performance degradation.
引用
收藏
页码:189 / 195
页数:7
相关论文
共 22 条
[1]  
Brown D. R., 2001, P INT C FIN CRYPT CH, P156
[2]  
CARTER JL, 1979, J COMPUT SYST SCI, V18, P143, DOI 10.1016/0022-0000(79)90044-8
[3]  
Cheng B, 2004, ESSCIRC 2004: PROCEEDINGS OF THE 30TH EUROPEAN SOLID-STATE CIRCUITS CONFERENCE, P219
[4]  
Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523
[5]   Controlled Physical Random Functions [J].
Gassend, B ;
Clarke, D ;
van Dijk, M ;
Devadas, S .
18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, :149-160
[6]  
GUAJARDO J, 2007, IN PRESS LNCS
[7]  
Gura N, 2002, LECT NOTES COMPUT SC, V2523, P349
[8]   Estimating the secrecy-rate of Physical Unclonable Functions with the context-tree weighting method [J].
Ignatenko, Tanya ;
Schrijen, Geert-Jan ;
Skoric, Boris ;
Tuyls, Pim ;
Willems, Frans .
2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, :499-+
[9]  
Jakobsson M, 1999, LECT NOTES COMPUT SC, V1636, P95
[10]  
Kahng AB, 1998, 1998 DESIGN AUTOMATION CONFERENCE, PROCEEDINGS, P776, DOI 10.1109/DAC.1998.724576