Exploiting Lithography Limits for Hardware Security Applications

R. S. Khan, H. Silva, Nafisa Noor, Chenglu Jin, Sadid Muneer, F. Dirisaglik, A. Cywar, Phuong Ha Nguyen, M. Van Dijk, A. Gokirmak
{"title":"Exploiting Lithography Limits for Hardware Security Applications","authors":"R. S. Khan, H. Silva, Nafisa Noor, Chenglu Jin, Sadid Muneer, F. Dirisaglik, A. Cywar, Phuong Ha Nguyen, M. Van Dijk, A. Gokirmak","doi":"10.1109/NANO46743.2019.8993902","DOIUrl":null,"url":null,"abstract":"Hardware security primitives such as physical obfuscated keys (POKs) allow tamper-resistant storage of random keys based on manufacturing or physical variability. The output bits of existing POK designs need to be first corrected due to measurement noise using error correction methods and then de-correlated by privacy amplification processes. These additional requirements increase the hardware overhead and reduce the efficiency of the system. In this work, we propose an intrinsically reliable POK design capable of generating random bits by exploiting the limits of the lithographic process for a given technology. Our design does not require any error correction and requires only XOR circuits for privacy amplification which reduces the hardware overhead of the whole system.","PeriodicalId":365399,"journal":{"name":"2019 IEEE 19th International Conference on Nanotechnology (IEEE-NANO)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 19th International Conference on Nanotechnology (IEEE-NANO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NANO46743.2019.8993902","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Hardware security primitives such as physical obfuscated keys (POKs) allow tamper-resistant storage of random keys based on manufacturing or physical variability. The output bits of existing POK designs need to be first corrected due to measurement noise using error correction methods and then de-correlated by privacy amplification processes. These additional requirements increase the hardware overhead and reduce the efficiency of the system. In this work, we propose an intrinsically reliable POK design capable of generating random bits by exploiting the limits of the lithographic process for a given technology. Our design does not require any error correction and requires only XOR circuits for privacy amplification which reduces the hardware overhead of the whole system.
利用光刻技术限制硬件安全应用
硬件安全原语,如物理混淆密钥(POKs),允许基于制造或物理可变性的随机密钥的防篡改存储。现有POK设计的输出位需要首先使用误差校正方法对测量噪声进行校正,然后通过隐私放大处理进行去相关。这些额外的需求增加了硬件开销,降低了系统的效率。在这项工作中,我们提出了一种内在可靠的POK设计,能够通过利用给定技术的光刻工艺的限制来生成随机比特。我们的设计不需要任何纠错,只需要XOR电路进行隐私放大,从而降低了整个系统的硬件开销。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信