摘要:
A method (100) is disclosed of generating an identifier from a semiconductor device (600) comprising a volatile memory (610) having a plurality of memory cells. The method comprises causing (110) the memory cells to assume a plurality of pseudo-random bit values inherent to variations in the microstructure of the memory cells; retrieving (120) the bit values from at least a subset of the plurality of memory cells; and generating the identifier from the retrieved bit values. The method (100) is based on the realization that a substantial amount of the cells of a volatile memory can assume a bit value that is governed by underlying variations in manufacturing process parameters; this for instance occurs at power-up for an SRAM or after a time period without refresh for a DRAM. This can be used for several identification purposes, such as identifying a semiconductor device (600) comprising the volatile memory (610), or for secure key generation by mapping error-correcting code words onto the identifier bit locations. The present invention further includes a semiconductor device (600, 1000) configured to be subjectable to the method (100) of the present invention.
摘要:
A method for alleviating burn-in effect and enabling performing a start-up process in respect of a device comprising a plurality of challengeable memory elements, wherein the memory elements are able to, upon start-up, generate a response pattern of start-up values useful for identification as the response pattern depends on physical characteristics of the memory elements, the method comprising the step of, after start-up of the memory elements, writing a data pattern to the memory elements which is inverse to a response pattern that was previously read from the same memory elements. Thus, degradation of the PMOS transistors due to NBTI can be alleviated.
摘要:
A method for alleviating burn-in effect and enabling performing a start-up process in respect of a device comprising a plurality of challengeable memory elements, wherein the memory elements are able to, upon start-up, generate a response pattern of start-up values useful for identification as the response pattern depends on physical characteristics of the memory elements, the method comprising the step of, after start-up of the memory elements, writing a data pattern to the memory elements which is inverse to a response pattern that was previously read from the same memory elements. Thus, degradation of the PMOS transistors due to NBTI can be alleviated.
摘要:
The invention relates to a tamper-resistant semiconductor device comprising a substrate (5) comprising an electronic circuit arranged on a first side thereof. An electrically-conductive protection layer (50, 50a, 50b) is arranged on a second side of the substrate (5) opposite to the first side. At least three through-substrate electrically-conductive connections (45) extend from the first side of the substrate (5) into the substrate (5) and in electrical contact with the electrically-conductive protection layer (50, 50a, 50b) on the second side of the substrate (5). A security circuit is arranged on the first side connected to the through-substrate electrically-conductive connections (45) and is arranged for measuring at least two resistance values (R12, R23, R34, R14, R13, R24) of the electrically-conductive protection layer (50, 50a, 50b) through the through-substrate electrically-conductive connections (45). The security circuit is further arranged for comparing the measured resistance values (R12, R23, R34, R14, R13, R24) with reference resistance values.
摘要:
This invention relates to a method and system for providing digital security by means of a reconfigurable physical uncloneable function, RPUF. The RPUF comprises a physical system constituted by distributed components arranged to generate a first response when receiving a first challenge at a point of the physical system. The physical reconfiguring of the RPUF comprises redistributing the components such that they generate a second response, which differs from said first response, when again applying the first challenge at the point. The reconfiguration step is further utilized in providing secure storage for digital items. The digital item is data of any kind, including data that needs to be accessed and updated, i.e. which is dynamic in nature. The method is exemplified by implementations such as secure storage of a key, a secure counter and a seed generator.
摘要:
A wearable accessory controls (103) and provides security for a pill delivering medical substances and services. An initialization procedure allows decryption information (814) to be loaded into the accessory for each pill and/or decryption information (818) about the accessory to be loaded into the pill. The pill preferably sends encrypted messages to the accessory and the accessory preferably sends encrypted messages to the pill. The pill operates only when the proximity of the accessory is verified or authenticated during the operation of the pill, preferably at frequent intervals. Where the pill is no longer useful, its information can be deleted (1205) from memory in the accessory or other controlling device.
摘要:
An efficient implementation of zero knowledge protocols for authentication of devices and for identification of devices connecting to a network. According to one aspect, the present invention provides a method of verifying the knowledge of a secret number s in a prover device by a verifier device having no knowledge of the secret number, with a zero-knowledge protocol using the Montgomery representation of numbers and Montgomery multiplication operations therein.
摘要:
The present invention relates to an electronic device, comprising a physical uncloneable function (PUF) module, and circuitry adapted to receive a cryptographic query (α) from an electronic unit, read, from the PUF module, data generated at a challenge of the PUF module, and generate a cryptographic response (β) based on the data, a random noise component comprised in the data, and the cryptographic query (α), thereby enabling authentication of the electronic device. An advantage with the invention is that it will not be necessary to include an additional random generator together with the electronic device, as the fuzzy output provided by the PUF module can be seen as already containing a random noise component. In some cryptographic schemes, the random noise provides for a possibility to reach a higher level of security and to minimize the possibility for a third party to find patterns in cryptographic responses generated during use of the electronic device. The present invention also relates to a similar authentication method.
摘要:
This invention relates to a method and system for providing digital security by means of a reconfigurable physical uncloneable function, RPUF. The RPUF comprises a physical system constituted by distributed components arranged to generate a first response when receiving a first challenge at a point of the physical system. The physical reconfiguring of the RPUF comprises redistributing the components such that they generate a second response, which differs from said first response, when again applying the first challenge at the point. The reconfiguration step is further utilized in providing secure storage for digital items. The digital item is data of any kind, including data that needs to be accessed and updated, i.e. which is dynamic in nature. The method is exemplified by implementations such as secure storage of a key, a secure counter and a seed generator.