-
公开(公告)号:US20210243042A1
公开(公告)日:2021-08-05
申请号:US17020287
申请日:2020-09-14
Applicant: Samsung Electronics Co., Ltd.
Inventor: Kyoungmoon Ahn , Yongki Lee , Yongsoo Kim
Abstract: A security device and an operating method thereof, which generate masking data for masking a key on the basis of a physically unclonable function (PUF), are provided. The security device includes a PUF circuit including a plurality of PUF cells outputting random key data and masking data, a key generator configured to generate a key through post-processing performed on the random key data, and a masking module configured to mask and store the key by using the masking data, wherein the random key data and the masking data are generated by different PUF cells.
-
公开(公告)号:US10476681B2
公开(公告)日:2019-11-12
申请号:US16140019
申请日:2018-09-24
Applicant: SAMSUNG ELECTRONICS CO., LTD.
Inventor: Yongsoo Kim , Mijung Noh , Bohdan Karpinskyy , Kyoungmoon Ahn , Yong Ki Lee , Yunhyeok Choi
Abstract: A semiconductor device includes a physical unclonable function (PUF) cell array that includes PUF cells outputting first bits; a non-volatile memory that stores marking bits indicating whether the first bits are valid, first mask bits generated by masking second bits depending on parity of the second bits, and second mask bits generated by masking helper bits of the second bits, the second bits are valid bits from the first bits; an extracting unit that extracts the second bits from the first bits using the marking bits; an unmasking unit that unmasks the second bits using the first mask bits while receiving the second bits to provide the third bits; a bit decoding unit that compresses the third bits to fourth bits while receiving the third bits; and a block decoding unit that generates a security key by decoding the fourth bits and the second mask bits.
-
公开(公告)号:US11368319B2
公开(公告)日:2022-06-21
申请号:US17015554
申请日:2020-09-09
Applicant: SAMSUNG ELECTRONICS CO., LTD.
Inventor: Yongsoo Kim , Juyeon Lee , Mijung Noh , Yongki Lee , Yunhyeok Choi
Abstract: The present disclosure relates to an integrated circuit and a method of using the integrated circuit used to perform authentication using a challenge-response method. The challenge-response method includes an internal challenge generator, a physically unclonable function (PUF) block, and a response generator. The internal challenge generator is configured to receive a challenge, generate a plurality of internal challenges corresponding to the challenge, and generate at least one valid internal challenge among the plurality of internal challenges using screen information. The physically unclonable function (PUF) block is configured to generate a plurality of valid internal responses respectively changing according to the plurality of valid internal challenges. The response generator is configured to output a response generated using the plurality of valid internal responses.
-
公开(公告)号:US11924359B2
公开(公告)日:2024-03-05
申请号:US17973252
申请日:2022-10-25
Applicant: SAMSUNG ELECTRONICS CO., LTD.
Inventor: Kyoungmoon Ahn , Yongsoo Kim , Yongki Lee , Yunhyeok Choi , Bohdan Karpinskyy
CPC classification number: H04L9/3278 , G06F21/64 , H04L9/0869
Abstract: A security device generates a key based on a physically unclonable function (PUF). The security device includes a physically unclonable function (PUF) block, an integrity detector, and a post processor. The PUF block outputs a plurality of first random signals and a plurality of corresponding first inverted random signals each having a logic level opposite to that of each of the plurality of corresponding first random signals. The integrity detector determines data integrity of the plurality of first random signals by using the plurality of first random signals and the plurality of corresponding first inverted random signals. The post processor generates a first row key that includes validity signals satisfying the data integrity.
-
公开(公告)号:US11689376B2
公开(公告)日:2023-06-27
申请号:US17020287
申请日:2020-09-14
Applicant: Samsung Electronics Co., Ltd.
Inventor: Kyoungmoon Ahn , Yongki Lee , Yongsoo Kim
CPC classification number: H04L9/3278 , H04L9/0866 , H04L2209/04 , H04L2209/12
Abstract: A security device and an operating method thereof, which generate masking data for masking a key on the basis of a physically unclonable function (PUF), are provided. The security device includes a PUF circuit including a plurality of PUF cells outputting random key data and masking data, a key generator configured to generate a key through post-processing performed on the random key data, and a masking module configured to mask and store the key by using the masking data, wherein the random key data and the masking data are generated by different PUF cells.
-
公开(公告)号:US11277272B2
公开(公告)日:2022-03-15
申请号:US16567751
申请日:2019-09-11
Applicant: SAMSUNG ELECTRONICS CO., LTD.
Inventor: Yunhyeok Choi , Yongki Lee , Yongsoo Kim , Jieun Park , Bohdan Karpinskyy
Abstract: Systems and methods are described based on an integrated circuit that performs a challenge-response physically unclonable function (PUF). The PUF is used for challenge-response authentication. The integrated circuit includes a PUP block configured to output an n-bit internal response corresponding to a challenge that requests a response where n is an integer greater than 1 and a response generator configured to calculate a Hamming weight of the internal response and output the response by comparing the Hamming weight with at least one reference.
-
公开(公告)号:US11516026B2
公开(公告)日:2022-11-29
申请号:US17014418
申请日:2020-09-08
Applicant: SAMSUNG ELECTRONICS CO., LTD.
Inventor: Kyoungmoon Ahn , Yongsoo Kim , Yongki Lee , Yunhyeok Choi , Bohdan Karpinskyy
Abstract: A security device generates a key based on a physically unclonable function (PUF). The security device includes a physically unclonable function (PUF) block, an integrity detector, and a post processor. The PUF block outputs a plurality of first random signals and a plurality of corresponding first inverted random signals each having a logic level opposite to that of each of the plurality of corresponding first random signals. The integrity detector determines data integrity of the plurality of first random signals by using the plurality of first random signals and the plurality of corresponding first inverted random signals. The post processor generates a first row key that includes validity signals satisfying the data integrity.
-
8.
公开(公告)号:US20180323968A1
公开(公告)日:2018-11-08
申请号:US16023626
申请日:2018-06-29
Applicant: Samsung Electronics Co., Ltd.
Inventor: Yong Ki Lee , Yongsoo Kim , Bohdan Karpinskyy , Yunhyeok Choi
IPC: H04L9/08
CPC classification number: H04L9/088 , H04L9/0866 , H04L2209/046 , H04L2209/34
Abstract: A key enrollment method of a physically unclonable function (PUF) circuit including a plurality of PUF cells includes receiving a first level key from PUF cells, performing bit encoding on the first level key using a bit coding table based on Hamming weights of a plurality of bits in the first level key to generate a second level key, storing first helper data associated with the second level key in a non-volatile memory, performing block encoding on the second level key using an error correction code to generate a third level key, and storing second helper data associated with the third level key in the non-volatile memory.
-
公开(公告)号:US10027480B2
公开(公告)日:2018-07-17
申请号:US14940749
申请日:2015-11-13
Applicant: Samsung Electronics Co., Ltd.
Inventor: Yong Ki Lee , Yongsoo Kim , Bohdan Karpinskyy , Yunhyeok Choi
Abstract: A key enrollment method of a physically unclonable function (PUF) circuit including a plurality of PUF cells includes receiving a first level key from PUF cells, performing bit encoding on the first level key using a bit coding table based on Hamming weights of a plurality of bits in the first level key to generate a second level key, storing first helper data associated with the second level key in a non-volatile memory, performing block encoding on the second level key using an error correction code to generate a third level key, and storing second helper data associated with the third level key in the non-volatile memory.
-
-
-
-
-
-
-
-