WO2015102253A1 - 디지털 값 처리 장치 및 방법 - Google Patents
디지털 값 처리 장치 및 방법 Download PDFInfo
- Publication number
- WO2015102253A1 WO2015102253A1 PCT/KR2014/012102 KR2014012102W WO2015102253A1 WO 2015102253 A1 WO2015102253 A1 WO 2015102253A1 KR 2014012102 W KR2014012102 W KR 2014012102W WO 2015102253 A1 WO2015102253 A1 WO 2015102253A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- digital value
- bit sequence
- grouping
- groups
- puf
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/73—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3278—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
Definitions
- It relates to the security field, and more particularly, to a device and a method for determining the randomness of a digital value generated by a physically unclonable function (PUF) and processing the digital value to improve the randomness as needed.
- PAF physically unclonable function
- PUFs Physically Unclonable Functions
- PUF may be referred to as Physical One-Way Function practically impossible to be duplicated (POWF) or Physical Random Function (PRF).
- PWF Physical One-Way Function practically impossible to be duplicated
- PRF Physical Random Function
- PUF Physical Uplink Detection Function
- PUF may be used to provide a unique key to distinguish devices from one another.
- Korean Patent Registration No. 10-1139630 (hereinafter '630 patent) has been presented a method for implementing the PUF.
- a process variation of a semiconductor is used to probabilistically determine whether an inter-layer contact or via is generated between conductive layers or conductive nodes of the semiconductor.
- a method for generating a PUF has been presented.
- One of the embodiments presented in the '630 patent is to design a small size of the via to be formed between the conductive layers so that the vias are formed randomly and when they are not. Thus, random digital values were generated that were not possible to artificially guess.
- the individual bit values included in the digital value are not biased to '0' or '1' so that they are true random numbers. It is preferable.
- a digital value processing device for processing a first digital value generated by a physically unclonable function (PUF) to generate a second digital value with greatly improved entropy.
- PAF physically unclonable function
- the apparatus may include: a grouping unit generating a plurality of groups by grouping a first bit sequence included in the first digital value; And a processor configured to calculate a second bit sequence from the plurality of groups by performing a logical operation to generate a second digital value including the second bit sequence.
- the logical operation may be an Exclusive Or (XOR) logical operation.
- the apparatus may further include a determining unit configured to read the first bit sequence and determine whether the first digital value has a predetermined level of randomness.
- the randomness of the predetermined level may satisfy a condition that the P-value calculated for the first bit sequence exceeds a predetermined threshold.
- the determiner may read the first bit sequence to determine a parameter associated with the grouping.
- the parameter may be the number of generated groups.
- the determination unit may include: a reading unit that reads the first bit sequence and calculates a ratio of '1' and '0' included in the first bit sequence; And a calculator configured to calculate the parameter such that the P-value of the second bit sequence calculated using the ratio satisfies a condition exceeding a predetermined threshold.
- a digital value processing method in which a digital value processing device generates a second digital value with greatly improved entropy by processing a first digital value generated by a PUF.
- the method may further include: a grouping unit of generating a plurality of groups by grouping a first bit sequence included in a first digital value generated by a physically unclonable function (PUF) by a grouping unit of the device; And a processing unit of performing a logical operation to calculate a second bit sequence from the plurality of groups to generate a second digital value including the second bit sequence.
- PAF physically unclonable function
- the logical operation may be an Exclusive Or (XOR) logical operation.
- the method may further include a determining step of determining, by the determination unit of the device, whether the first digital value has a predetermined level of randomness by reading the first bit sequence. have.
- the randomness of the predetermined level may satisfy a condition that the P-value calculated for the first bit sequence exceeds a predetermined threshold.
- the method may further include a determining step of determining, by the determining unit of the device, the parameter related to the grouping by reading the first bit sequence.
- the parameter may be the number of generated groups.
- the determining step may include: calculating a ratio of '1' and '0' included in the first bit sequence by reading the first bit sequence; And calculating the parameter such that a P-value of the second bit sequence calculated using the ratio satisfies a condition exceeding a predetermined threshold.
- FIG. 1 is a block diagram of a digital value processing apparatus according to an embodiment.
- FIG. 2 is a conceptual diagram illustrating a detailed configuration and operation of a determination unit according to an embodiment.
- FIG. 3 is a conceptual diagram illustrating a detailed configuration and operation of a determination unit according to an embodiment.
- FIG. 4 is a conceptual diagram illustrating an operation of a grouping unit and a processing unit, according to an exemplary embodiment.
- FIG. 5 is a flowchart illustrating a digital value processing method according to an embodiment.
- FIG. 6 is a flowchart illustrating a digital value processing method according to an embodiment.
- FIG. 1 is a block diagram of a digital value processing apparatus 100 according to an embodiment.
- the digital value processing apparatus 100 processes the first digital value A generated by the PUF to generate a second digital value B with greatly improved entropy and / or randomness.
- the first digital value A generated by the PUF is received.
- the digital value A may include m bit sequences a 1 to a m .
- m is a natural number.
- the determination unit 110 determines a parameter to process the m bit sequence to ensure the randomness.
- the processing may be performed by grouping m bit sequences into n, and calculating n bit sequences by performing a logical operation on the bit sequences included in each group.
- n is a natural number.
- the calculated n bit sequences may be referred to as a second digital value B.
- the parameter determined by the determination unit 110 may be the number i of the bit sequences included in one group when the grouping is performed. i is a natural number.
- the digital value B can be a value which is greatly improved in randomness or entropy.
- each of the m bit sequences a 1 to a m included in the first digital value A provided by the PUF is '1' is p, and the probability that it is '0' is q. Then, the sum of p and q is 1, and each of p and q is a real number of 0 or more and 1 or less.
- the grouping unit 120 groups m bit sequences by i to generate n or more groups. If the digital value B including the random sequence to be generated is n bits, i may be a natural number selected by the determiner 110 among values of (m / n) or less.
- the processor 130 generates a digital value of 1 bit by performing a logical operation on the i bit sequence included in one group.
- One bit from each of the n groups may be generated to generate n bits of digital values.
- the logical operation may be an eXclusive OR (XOR) operation calculated by inputting the i bit sequences.
- XOR eXclusive OR
- Equation 1 As the value of i increases, the probability that the bit value determined as the output of the XOR operation is '1' converges to 50%. Therefore, even if the probability that each of the i input bit values included in one group is '1' is not 50%, as the value of i is increased, the output of the XOR operation rapidly approaches 50%, so that entropy is greatly increased.
- FIG. 2 is a conceptual diagram illustrating a detailed configuration and operation of the determination unit 110 according to an embodiment.
- the determiner 110 receives the first digital value A from the PUF 201.
- the digital value A generated by the PUF 201 may include m bit sequences a 1 to a m . Where m is a natural number.
- the PUF 201 may include m vias formed between conductive layers of the semiconductor.
- the bit sequences a 1 to a m may be determined as digital values '1' or '0' depending on whether each of the m vias shorts or fails between the conductive layers of the semiconductor.
- the probability that each of the bit sequences a 1 to a m becomes '1' is p, and the probability that it becomes '0' is q.
- the reading unit 210 reads the bit sequences a 1 to a m included in the digital value A generated by the PUF 201. Through this reading process, the number of '1' and the number of '0' included in the bit sequences a 1 to a m may be counted. When a count is made, p may be a ratio of the number of sequences having a value of '1' among m bit sequences.
- the calculation unit 220 determines whether the bit sequences a 1 to a m pass a predetermined randomness test by using the count of '1' and the number of '0'.
- the calculator 220 calculates and / or predicts a P-Value according to NIST 800-22 in advance with respect to the digital value A generated by the PUF 201 so that the digital value A passes the frequency test. You can determine if you can.
- the failure rate can be predicted in advance, and the grouping to be used by the grouping unit 120 and the processing unit 130 of FIG. 1 to pass the test. You can also determine the size.
- the P-Value according to NIST 800-22 is calculated as follows.
- the calculation unit 220 is applied to the bit sequence a k in accordance with Equation 2 For obtaining the X k, it calculates a value by adding the S m X k.
- the process is a sequence of bits k is the case of "1" in case the X value k to "1", and a bit sequence k '0' by converting the X k value to '1', and then, a bit sequence of m It is the process of calculating the S m value which adds all the calculated X k values for these fields.
- the S m value is positive; conversely, if the bit sequence contains more '0' than '1', the S m value is negative.
- NIST 800-22 proposes a decision rule that determines that digital value A is a random sequence when the calculated P-value is larger than a certain threshold.
- the threshold may be, for example, 0.1 or 0.01, and may be set differently according to the level of randomness required.
- the calculation unit 220 may check the randomness of the digital value A provided by the PUF 201 through this calculation.
- a bit sequence having a probability of '1' p may be grouped by i, and the bit sequence of 1 bit may be calculated for each group by performing an XOR operation on the i bit sequences of each group. Then, n bits of the second digital value B are generated by the n groups.
- Equation 1 the probability that each of the n bit sequences included in the second digital value B is '1' to be.
- the P-value when generating the second bit sequence B of n bits can be calculated in advance by grouping the given first bit sequences by i and performing XOR operation on each group.
- the calculation unit 220 calculates a grouping size i necessary to pass a randomness test, for example, the NIST 800-22. You can also pay. This process will be described in more detail with reference to FIG. 3.
- 3 is a conceptual diagram illustrating a detailed configuration and operation of the determination unit 110 according to an embodiment.
- the reading unit 210 counts '1' of the bit sequences a 1 to a m . p can be calculated.
- the P-value may be calculated by substituting n and the calculated p into Equation 5. Then, the group size i for passing the random test according to the given decision rule can be calculated.
- the group size i is calculated. As such, it may be determined that at least n * i via holes should be formed in one PUF.
- FIG. 4 is a conceptual diagram illustrating an operation of the grouping unit 120 and the processing unit 130 according to an embodiment.
- the grouping unit 120 groups the bit sequences included in the first digital value A into n to generate groups A 1 to A n .
- Each group contains i bit sequences.
- the processor 130 calculates one digital bit b k by performing an XOR operation on i bit sequences included in each group. For example, b 1 is calculated using the i bit sequence included in the group A 1 as an input of an XOR operation.
- n bits of the second digital value B are generated through the n groups.
- the second digital value B has a very high entropy. Therefore, it is suitable for use in the field of security.
- FIG. 5 is a flowchart illustrating a digital value processing method according to an embodiment.
- the reading unit 210 of FIG. 1 reads the first digital value A provided by the PUF 201.
- the first digital value A may include m bit sequences.
- the calculator 220 may calculate a P-value of the first digital value A using Equations 2 to 4 below.
- the calculator 220 compares the calculated P-value with a threshold value according to a predetermined decision rule, for example, 0.1 or 0.01, to determine whether the first digital value A can pass the random test.
- a predetermined decision rule for example, 0.1 or 0.01
- the failure rate can be predicted in advance, and the grouping to be used by the grouping unit 120 and the processing unit 130 of FIG. 1 to pass the test. You can also determine the size.
- FIG. 6 is a flowchart illustrating a digital value processing method according to an embodiment.
- step 610 it is determined whether the first digital value A passes the given random test. If the random test passes when only the n-bit sequence included in the digital value A itself is selected, the second digital value B may be determined as the predetermined and / or randomly selected n bits.
- step 610 if it is determined in step 610 that the random test does not pass, then in step 620 a grouping size i for generating a random sequence of n bits may be determined.
- the grouping size i may be determined as a minimum natural number at which the P-value calculated according to Equation 5 becomes larger than the threshold.
- the grouping unit 120 groups the bit sequences included in the first digital value A by i to generate n groups. Examples of grouped results are as A 1 to A n described with reference to FIG. 4.
- the processor 130 performs an XOR operation on the i bit sequences of each group to calculate a bit sequence of 1 bit for each group. Then, n bits of the second digital value B are generated by the n groups.
- the second digital generated by the digital value processing apparatus 100 does not have a 50% probability that the individual bit sequence of the first first digital value A generated by the PUF is '1'.
- the value B can be randomized by greatly improving entropy.
- the apparatus described above may be implemented as a hardware component, a software component, and / or a combination of hardware components and software components.
- the devices and components described in the embodiments may be, for example, processors, controllers, arithmetic logic units (ALUs), digital signal processors, microcomputers, field programmable arrays (FPAs), It may be implemented using one or more general purpose or special purpose computers, such as a programmable logic unit (PLU), microprocessor, or any other device capable of executing and responding to instructions.
- the processing device may execute an operating system (OS) and one or more software applications running on the operating system.
- the processing device may also access, store, manipulate, process, and generate data in response to the execution of the software.
- OS operating system
- the processing device may also access, store, manipulate, process, and generate data in response to the execution of the software.
- processing device includes a plurality of processing elements and / or a plurality of types of processing elements. It can be seen that it may include.
- the processing device may include a plurality of processors or one processor and one controller.
- other processing configurations are possible, such as parallel processors.
- the software may include a computer program, code, instructions, or a combination of one or more of the above, and configure the processing device to operate as desired, or process it independently or collectively. You can command the device.
- Software and / or data may be any type of machine, component, physical device, virtual equipment, computer storage medium or device in order to be interpreted by or to provide instructions or data to the processing device. Or may be permanently or temporarily embodied in a signal wave to be transmitted.
- the software may be distributed over networked computer systems so that they may be stored or executed in a distributed manner.
- Software and data may be stored on one or more computer readable recording media.
- the method according to the embodiment may be embodied in the form of program instructions that can be executed by various computer means and recorded in a computer readable medium.
- the computer readable medium may include program instructions, data files, data structures, etc. alone or in combination.
- the program instructions recorded on the media may be those specially designed and constructed for the purposes of the embodiments, or they may be of the kind well-known and available to those having skill in the computer software arts.
- Examples of computer-readable recording media include magnetic media such as hard disks, floppy disks, and magnetic tape, optical media such as CD-ROMs, DVDs, and magnetic disks, such as floppy disks.
- Examples of program instructions include not only machine code generated by a compiler, but also high-level language code that can be executed by a computer using an interpreter or the like.
- the hardware device described above may be configured to operate as one or more software modules to perform the operations of the embodiments, and vice versa.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mathematical Physics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Compression, Expansion, Code Conversion, And Decoders (AREA)
- Mobile Radio Communication Systems (AREA)
- Complex Calculations (AREA)
Abstract
Description
Claims (12)
- PUF (Physically Unclonable Function)에 의해 생성되는 제1 디지털 값에 포함되는 제1 비트 시퀀스를 그룹핑 하여, 복수 개의 그룹을 생성하는 그룹핑부; 및논리 연산을 통해 상기 복수 개의 그룹으로부터 제2 비트 시퀀스를 계산하여, 상기 제2 비트 시퀀스를 포함하는 제2 디지털 값을 생성하는 처리부를 포함하는 디지털 값 처리 장치.
- 제1항에 있어서,상기 논리 연산은 익스클러시브 오어(XOR) 논리 연산인 디지털 값 처리 장치.
- 제1항에 있어서,상기 제1 비트 시퀀스를 판독하여 상기 제1 디지털 값이 미리 지정된 레벨의 랜덤성을 가지는 지의 여부를 판단하는 판단부를 더 포함하는 디지털 값 처리 장치.
- 제3항에 있어서,상기 미리 지정된 레벨의 랜덤성은 상기 제1 비트 시퀀스 대해 계산되는 P-value가 미리 지정된 임계치를 초과하는 조건을 만족시키는 것인 디지털 값 처리 장치.
- 제1항에 있어서,상기 제1 비트 시퀀스를 판독하여 상기 그룹핑에 연관되는 파라미터를 결정하는 판단부를 더 포함하는 디지털 값 처리 장치.
- 제5항에 있어서,상기 파라미터는 상기 생성되는 복수 개의 그룹 개수이고,상기 판단부는,상기 제1 비트 시퀀스를 판독하여 상기 제1 비트 시퀀스에 포함되는 '1'과 '0'의 비율을 계산하는 판독부; 및상기 비율을 이용하여 계산되는 상기 제2 비트 시퀀스의 P-value가 미리 지정된 임계치를 초과하는 조건을 만족시키도록 하는 상기 파라미터를 계산하는 계산부를 포함하는 디지털 값 처리 장치.
- 디지털 값 처리 장치의 그룹핑부가, PUF (Physically Unclonable Function)에 의해 생성되는 제1 디지털 값에 포함되는 제1 비트 시퀀스를 그룹핑 하여, 복수 개의 그룹을 생성하는 그룹핑 단계; 및상기 장치의 처리부가, 논리 연산을 수행하여 상기 복수 개의 그룹으로부터 제2 비트 시퀀스를 계산하여, 상기 제2 비트 시퀀스를 포함하는 제2 디지털 값을 생성하는 처리 단계를 포함하는 디지털 값 처리 방법.
- 제7항에 있어서,상기 논리 연산은 익스클러시브 오어(XOR) 논리 연산인 디지털 값 처리 방법.
- 제7항에 있어서,상기 장치의 판단부가, 상기 제1 비트 시퀀스를 판독하여 상기 제1 디지털 값이 미리 지정된 레벨의 랜덤성을 가지는 지의 여부를 판단하는 판단 단계를 더 포함하는 디지털 값 처리 방법.
- 제9항에 있어서,상기 미리 지정된 레벨의 랜덤성은 상기 제1 비트 시퀀스 대해 계산되는 P-value가 미리 지정된 임계치를 초과하는 조건을 만족시키는 것인 디지털 값 처리 방법.
- 제7항에 있어서,상기 장치의 판단부가, 상기 제1 비트 시퀀스를 판독하여 상기 그룹핑에 연관되는 파라미터를 결정하는 판단 단계를 더 포함하는 디지털 값 처리 방법.
- 제11항에 있어서,상기 파라미터는 상기 생성되는 복수 개의 그룹 개수이고,상기 판단 단계는,상기 제1 비트 시퀀스를 판독하여 상기 제1 비트 시퀀스에 포함되는 '1'과 '0'의 비율을 계산하는 단계; 및상기 비율을 이용하여 계산되는 상기 제2 비트 시퀀스의 P-value가 미리 지정된 임계치를 초과하는 조건을 만족시키도록 하는 상기 파라미터를 계산하는 단계를 포함하는 디지털 값 처리 방법.
Priority Applications (5)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP14876633.0A EP3091470B1 (en) | 2013-12-31 | 2014-12-10 | Apparatus and method for processing digital value |
| JP2016544534A JP2017508173A (ja) | 2013-12-31 | 2014-12-10 | デジタル値処理装置及び方法 |
| US15/109,317 US10872172B2 (en) | 2013-12-31 | 2014-12-10 | Apparatus and method for processing digital value |
| CN201480076501.6A CN106030605B (zh) | 2013-12-31 | 2014-12-10 | 数字值处理装置及方法 |
| EP19155303.1A EP3503079A1 (en) | 2013-12-31 | 2014-12-10 | Apparatus and method for processing random number extracted from pufs |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| KR1020130168558A KR102198499B1 (ko) | 2013-12-31 | 2013-12-31 | 디지털 값 처리 장치 및 방법 |
| KR10-2013-0168558 | 2013-12-31 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2015102253A1 true WO2015102253A1 (ko) | 2015-07-09 |
Family
ID=53493560
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/KR2014/012102 Ceased WO2015102253A1 (ko) | 2013-12-31 | 2014-12-10 | 디지털 값 처리 장치 및 방법 |
Country Status (7)
| Country | Link |
|---|---|
| US (1) | US10872172B2 (ko) |
| EP (2) | EP3091470B1 (ko) |
| JP (1) | JP2017508173A (ko) |
| KR (1) | KR102198499B1 (ko) |
| CN (1) | CN106030605B (ko) |
| TW (1) | TWI640896B (ko) |
| WO (1) | WO2015102253A1 (ko) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110569676A (zh) * | 2018-06-05 | 2019-12-13 | 英飞凌科技股份有限公司 | 用于转换输入比特序列的加密设备和方法 |
| US11283632B2 (en) | 2017-12-28 | 2022-03-22 | Mitsubishi Heavy Industries, Ltd. | Integrated circuit, control device, information distribution method, and information distribution system |
Families Citing this family (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2015012667A1 (ko) | 2013-07-26 | 2015-01-29 | (주) 아이씨티케이 | 랜덤성 테스트 장치 및 방법 |
| KR102836787B1 (ko) * | 2016-11-16 | 2025-07-18 | 삼성전자주식회사 | 난수 생성기의 랜덤성 시험 장치 및 방법 |
| WO2019011607A1 (en) * | 2017-07-10 | 2019-01-17 | Intrinsic Id B.V. | GENERATION OF A SECURE KEY FROM AN UNCONCLABLE PHYSICAL FUNCTION SOLICITED |
| FR3069677A1 (fr) * | 2017-07-27 | 2019-02-01 | Stmicroelectronics (Crolles 2) Sas | Dispositif de generation d'un nombre aleatoire |
| CN107943450A (zh) * | 2017-11-17 | 2018-04-20 | 上海众人网络安全技术有限公司 | 随机数生成方法、装置、计算机设备及计算机可读介质 |
| CN110018810B (zh) * | 2018-01-10 | 2021-05-18 | 力旺电子股份有限公司 | 随机码产生器 |
| US20210026602A1 (en) * | 2019-07-25 | 2021-01-28 | PUFsecurity Corporation | Entropy Generator and Method of Generating Enhanced Entropy Using Truly Random Static Entropy |
| CN112764977B (zh) * | 2019-11-05 | 2024-08-27 | 深圳宏芯宇电子股份有限公司 | 存储控制器以及测试数据产生方法 |
| US11714945B2 (en) | 2020-04-09 | 2023-08-01 | Tokyo Electron Limited | Method for automated standard cell design |
| WO2022212375A1 (en) * | 2021-03-31 | 2022-10-06 | Tokyo Electron Limited | Method for automated standard cell design |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20110055649A1 (en) * | 2009-08-25 | 2011-03-03 | Farinaz Koushanfar | Testing security of mapping functions |
| KR101139630B1 (ko) | 2010-12-09 | 2012-05-30 | 한양대학교 산학협력단 | 식별키 생성 장치 및 방법 |
| JP2012105056A (ja) * | 2010-11-10 | 2012-05-31 | Nec Corp | デバイス固有情報生成装置、デバイス固有情報生成方法および認証装置 |
| US20130147511A1 (en) * | 2011-12-07 | 2013-06-13 | Patrick Koeberl | Offline Device Authentication and Anti-Counterfeiting Using Physically Unclonable Functions |
| EP2615571A1 (en) * | 2012-01-16 | 2013-07-17 | Gemalto SA | Method of generating an identifier of an electronic device |
Family Cites Families (16)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2003131867A (ja) * | 2001-08-15 | 2003-05-09 | Syst Kogaku Kk | 乱数生成装置 |
| JP3604674B2 (ja) * | 2001-09-26 | 2004-12-22 | 株式会社東芝 | 乱数生成回路 |
| TWI258698B (en) * | 2004-04-06 | 2006-07-21 | Ind Tech Res Inst | Static floating-point processor suitable for embedded digital signal processing and shift control method thereof |
| EP1758020A4 (en) * | 2004-06-18 | 2008-11-26 | Fujitsu Ltd | RANDOM PRODUCTION DEVICE, PRODUCTION METHOD, GENERATOR EVALUATION METHOD AND USE METHOD FOR RANDOM NUMBERS |
| WO2007069190A2 (en) | 2005-12-14 | 2007-06-21 | Nxp B.V. | On-chip estimation of key-extraction parameters for physical tokens |
| CN101923647B (zh) * | 2005-12-23 | 2013-01-09 | 英根亚控股有限公司 | 光学鉴别 |
| TW200807425A (en) * | 2006-06-05 | 2008-02-01 | Renesas Tech Corp | Semiconductor device, unique ID of semiconductor device and method for verifying unique ID |
| JP4950924B2 (ja) * | 2008-03-19 | 2012-06-13 | 日本電信電話株式会社 | カオスレーザ発振器と、それを用いた超高速物理乱数生成装置とその方法と、そのプログラムと記録媒体 |
| US8121825B2 (en) * | 2008-04-30 | 2012-02-21 | Synopsys, Inc. | Method and apparatus for executing a hardware simulation and verification solution |
| WO2011086688A1 (ja) * | 2010-01-15 | 2011-07-21 | 三菱電機株式会社 | ビット列生成装置及びビット列生成方法 |
| US20120183135A1 (en) * | 2011-01-19 | 2012-07-19 | Verayo, Inc. | Reliable puf value generation by pattern matching |
| WO2013025060A2 (ko) * | 2011-08-16 | 2013-02-21 | (주)아이씨티케이 | 사물지능통신에서 puf에 기반한 장치간 보안 인증 장치 및 방법 |
| US8525169B1 (en) * | 2012-08-10 | 2013-09-03 | International Business Machines Corporation | Reliable physical unclonable function for device authentication |
| CN103188075B (zh) * | 2013-02-01 | 2016-01-06 | 广州大学 | 一种密钥和真随机数发生器及生成密钥和真随机数的方法 |
| US10333708B1 (en) * | 2017-02-03 | 2019-06-25 | Amazon Technologies, Inc. | Hybrid random-number generator |
| US10581841B2 (en) * | 2017-02-13 | 2020-03-03 | Zentel Japan Corporation | Authenticated network |
-
2013
- 2013-12-31 KR KR1020130168558A patent/KR102198499B1/ko active Active
-
2014
- 2014-12-10 CN CN201480076501.6A patent/CN106030605B/zh active Active
- 2014-12-10 WO PCT/KR2014/012102 patent/WO2015102253A1/ko not_active Ceased
- 2014-12-10 EP EP14876633.0A patent/EP3091470B1/en active Active
- 2014-12-10 US US15/109,317 patent/US10872172B2/en active Active
- 2014-12-10 JP JP2016544534A patent/JP2017508173A/ja active Pending
- 2014-12-10 EP EP19155303.1A patent/EP3503079A1/en not_active Withdrawn
- 2014-12-31 TW TW103146426A patent/TWI640896B/zh active
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20110055649A1 (en) * | 2009-08-25 | 2011-03-03 | Farinaz Koushanfar | Testing security of mapping functions |
| JP2012105056A (ja) * | 2010-11-10 | 2012-05-31 | Nec Corp | デバイス固有情報生成装置、デバイス固有情報生成方法および認証装置 |
| KR101139630B1 (ko) | 2010-12-09 | 2012-05-30 | 한양대학교 산학협력단 | 식별키 생성 장치 및 방법 |
| US20130147511A1 (en) * | 2011-12-07 | 2013-06-13 | Patrick Koeberl | Offline Device Authentication and Anti-Counterfeiting Using Physically Unclonable Functions |
| EP2615571A1 (en) * | 2012-01-16 | 2013-07-17 | Gemalto SA | Method of generating an identifier of an electronic device |
Non-Patent Citations (2)
| Title |
|---|
| "A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications", NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST |
| See also references of EP3091470A4 * |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11283632B2 (en) | 2017-12-28 | 2022-03-22 | Mitsubishi Heavy Industries, Ltd. | Integrated circuit, control device, information distribution method, and information distribution system |
| CN110569676A (zh) * | 2018-06-05 | 2019-12-13 | 英飞凌科技股份有限公司 | 用于转换输入比特序列的加密设备和方法 |
| CN110569676B (zh) * | 2018-06-05 | 2023-12-05 | 英飞凌科技股份有限公司 | 用于转换输入比特序列的加密设备和方法 |
Also Published As
| Publication number | Publication date |
|---|---|
| TWI640896B (zh) | 2018-11-11 |
| CN106030605B (zh) | 2020-07-07 |
| EP3091470A4 (en) | 2017-01-11 |
| TW201539243A (zh) | 2015-10-16 |
| KR20150078817A (ko) | 2015-07-08 |
| KR102198499B1 (ko) | 2021-01-05 |
| EP3091470B1 (en) | 2019-02-06 |
| US20160335458A1 (en) | 2016-11-17 |
| US10872172B2 (en) | 2020-12-22 |
| CN106030605A (zh) | 2016-10-12 |
| JP2017508173A (ja) | 2017-03-23 |
| EP3503079A1 (en) | 2019-06-26 |
| EP3091470A1 (en) | 2016-11-09 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2015102253A1 (ko) | 디지털 값 처리 장치 및 방법 | |
| WO2015102359A1 (ko) | 랜덤한 디지털 값을 생성하는 장치 및 방법 | |
| Dofe et al. | Hardware security assurance in emerging IoT applications | |
| US10121011B2 (en) | Apparatus, method and article of manufacture for partially resisting hardware trojan induced data leakage in sequential logics | |
| Koteshwara et al. | Key-based dynamic functional obfuscation of integrated circuits using sequentially triggered mode-based design | |
| Kodýtek et al. | Improved ring oscillator PUF on FPGA and its properties | |
| WO2015012667A1 (ko) | 랜덤성 테스트 장치 및 방법 | |
| WO2012077856A1 (ko) | 식별키 생성 장치 및 방법 | |
| CN103650407A (zh) | 用于检查n中取m码的方法 | |
| EP3311324A1 (en) | Enhanced security of power management communications and protection from side channel attacks | |
| US11968306B2 (en) | PUF key transfer | |
| WO2017165296A1 (en) | System, method and computer-accessible medium for satisfiability attack resistant logic locking | |
| WO2018004086A2 (ko) | 임의접속 과정을 통한 통신 장치 및 방법 | |
| KR20110083591A (ko) | 차동 로직에 의해 보호되는 암호화 회로에서 편차를 검출하는 방법, 및 그 방법을 구현하는 회로 | |
| CN116318629A (zh) | 一种数据加密装置 | |
| WO2015053441A1 (ko) | 식별키 생성 장치 및 방법 | |
| WO2014119834A1 (ko) | 리셋 신호 경로상의 버퍼를 이용한 광학 오류 주입 탐지 회로 | |
| KR20140037153A (ko) | 랜덤 출력 비트 시퀀스의 생성 방법 | |
| CN107220545A (zh) | 一种硬件加密系统、方法及服务器 | |
| CN113268745B (zh) | 基于Camellia加密算法的软PUF | |
| US20140223568A1 (en) | Method for securely checking a code | |
| Zhang et al. | Invariance checking based Trojan detection method for three-dimensional integrated circuits | |
| EP4562804B1 (en) | Authorized side-channel monitoring | |
| Zhang et al. | Low-cost anti-modeling attack PUF circuit based on configurable APUF | |
| Wang et al. | Timing-violation-soft PUF design based on carry-lookahead adder |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14876633 Country of ref document: EP Kind code of ref document: A1 |
|
| ENP | Entry into the national phase |
Ref document number: 2016544534 Country of ref document: JP Kind code of ref document: A |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 15109317 Country of ref document: US |
|
| REEP | Request for entry into the european phase |
Ref document number: 2014876633 Country of ref document: EP |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2014876633 Country of ref document: EP |





