Robust Device Authentication for Integrated Circuits
- Detailed Technology Description
- Physical Unclonable Function Authentication with Self CorrectionA lightweight, secure and reliable method authenticates chip-unique signatures from integrated circuits to address electronics counterfeiting. The method, based on Physical Unclonable Function (PUF) authentication, uses a key (selected for authentication purposes) with a two-level finite-state machine (FSM) to correct erroneous bits in the authentication process that can be generated by age, temperature, voltage, and various environmental variations. The technology includes a FSM and a physical structure that provides a response to a challenge. However, before the physical structure is ever provided with the challenge, the response to the challenge is unpredictable. The FSM moves from an initial state to an intermediate state when it receives a response from the physical structure, and moves from the intermediate state to a final state when it receives a key. The final state indicates whether the physical structure is a counterfeit physical structure.More Efficient Error Correcting CodePUFs extract chip-unique signatures from integrated circuits (ICs) by exploiting uncontrollable randomness due to manufacturing process variations. These signatures can then be used for many hardware security applications such as authentication, anti-counterfeiting, IC metering, signature generation and obfuscation. However, most of these applications require error correcting methods to produce consistent PUF responses across different environmental conditions. Sometimes, due to environmental variations, PUF signatures are erroneous, and while an error correction coder can correct these errors, it requires a large increase in hardware. This technology generates the correct signature, without requiring any additional error correction circuitry, by associating a key with the signature during the design time. Experimental results show that this self-correcting two-level FSM approach costs significantly less than commonly used error correcting codes. In addition, the new method consumes 2 to 10 times less area and 20 to 100 times less power than previous technology.BENEFITS AND FEATURES:Authenticates chip-unique signatures from integrated circuitsPhysical Unclonable Function (PUF) authenticationSelf-correcting two-level finite-state machine (FSM) approach associates a key with the signatureCorrects erroneous bits in authentication processPhysical structure provides a response to a challengeLightweight, secure and reliableSignificantly lower cost than commonly used error correcting codesConsumes 2 to 10 times less areaUses 20 to 100 times less powerAPPLICATIONS:Integrated circuit chipsIntegrated devicesAnti-counterfeiting measuresPhase of Development - Prototype development
- *Abstract
-
None
- Country/Region
- USA

For more information, please click Here