[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1007/978-3-642-12368-9_22guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Towards electrical, integrated implementations of SIMPL systems

Published: 12 April 2010 Publication History

Abstract

This paper discusses strategies for the electrical, integrated implementation of a novel security tool termed SIMPL system, which was introduced in [1]. SIMPL systems are a public key version of Physical Unclonable Functions (PUFs). Like a PUF, each SIMPL system S is physically unique and non-reproducible, and implements an individual function FS. In opposition to a PUF, every SIMPL system S possesses a publicly known numerical description D(S), which allows its digital simulation and prediction. However, any such simulation must work at a detectably lower speed than the real-time behavior of S. As argued in [1], SIMPL systems have practicality and security advantages over PUFs, Certificates of Authenticity (COAs), Physically Obfuscated Keys (POKs), and also over standard mathematical cryptotechniques. This manuscript focuses on electrical, integrated realizations of SIMPL systems, and proposes two potential candidates: SIMPL systems derived from special SRAM-architectures (so-called “skew designs” of SRAM cells), and implementations based on analog computing arrays called Cellular Non-Linear Networks (CNNs).

References

[1]
Rührmair, U.: SIMPL Systems: On a Public-Key Variant of Physical Unclonable Functions. Available from IACR Preprint Archive. Report 2009/255, http://eprint.iacr.org
[2]
Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical One-Way Functions. Science 297, 2026-2030 (2002)
[3]
Pappu, R.: Physical One-Way Functions, PhD Thesis, MIT
[4]
Gassend, B.: Physical Random Functions, MSc Thesis, MIT (2003)
[5]
Tuyls, P., Schrijen, G.-J., Škorić, B., van Geloven, J., Verhaegh, N., Wolters, R.: Read-Proof Hardware from Protective Coatings. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 369-383. Springer, Heidelberg (2006)
[6]
Edward Suh, G., Devadas, S.: Physical Unclonable Functions for Device Authentication and Secret Key Generation. In: DAC 2007, pp. 9-14 (2007)
[7]
Tuyls, P., Skoric, B.: Strong Authentication with PUFs. In: Petkovic, M., Jonker, W. (eds.) Security, Privacy and Trust in Modern Data Management. Springer, Heidelberg (2007)
[8]
Tuyls, P., Skoric, B., Kevenaar, T. (eds.): Security with Noisy Data. Springer, Heidelberg (2007)
[9]
Rührmair, U., Sölter, J., Sehnke, F.: On the Foundations of Physical Unclonable Functions (2009) (submitted), http://eprint.iacr.org/
[10]
Feynman, R.P.: Simulating Physics with Computers. International Journal of Theoretical Physics 21(6&7), 467-488 (1982)
[11]
DeJean, G., Kirovski, D.: RF-DNA: Radio-Frequency Certificates of Authenticity. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 346-363. Springer, Heidelberg (2007)
[12]
Srinivas, B.N.: SRAM for use in Physical Cryptography. MSc Thesis, Department for Electrical Engineering and Information Technology, TU München (2009)
[13]
Wolfram, S.: Statistical mechanics of cellular automata. Rev. Mod. Phys. 55, 601-644 (1983)
[14]
Roska, T., Chua, L.O.: The CNN universal machine: An analogic array computer. Circuits and Systems II: IEEE Transactions on Analog and Digital Signal Processing 40(3), 163-173 (1993)
[15]
Kennedy, M.P.: Three steps to chaos. II: A Chua's circuit primer. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications 40(10), 657-674 (1993)
[16]
Zou, F., Nossek, J.A.: A chaotic attractor with cellular neural networks. IEEE Transaction on Circuits and Systems 38, 811-812 (1991)
[17]
Ogorzalek, M.J., Galias, Z., Dqbrowski, A.M., Dqbrowski, W.R.: ChaoticWaves and Spatio-Temporal Patterns in Large Arrays of Doubly-Coupled Chua' s Circuits. IEEE Transactions on Circuits and Systems-I: Fundamental Theory and Applications 42(10) (October 1995)
[18]
Gomez-Gesteira, M., de Castro, M., Perez-Villar, V., Chua, L.O.: Experimental Chua's Circuit Arrays As an Autowave Simulator. IEEE Transactions on Circuits and Systems-I: Fundamental Theory and Applications 46(4) (April 1999)
[19]
Yao, A.C.-C.: Classical physics and the Church-Turing Thesis. Journal of the ACM 50(1), 100-105 (2003)
[20]
Scott Aaronson: NP-complete Problems and Physical Reality. Electronic Colloquium on Computational Complexity (ECCC), 026 (2005)
[21]
Shor, P.W.: Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM J. Comput. 26(5), 1484-1509 (1997)
[22]
Chua, L.O., Roska, T.: Cellular Neural Networks and Visual Computing: Foundations and Applications. Cambridge University Press, Cambridge (2005)
[23]
Rodriguez-Vazquez, A., Linan-Cembrano, G., Carranza, L., Roca-Moreno, E., Carmona-Galan, R., Jimenez-Garrido, F., Dominguez-Castro, R., Meana, S.: ACE16k: The Third Generation of Mixed Signal SIMD-CNN ACE Chips Toward VSoCs. IEEE Trans. on Circuits and Systems - I 51(5), 851-863 (2004)
[24]
Chua, L.O., Roska, T., Kozek, T., Zarandy, A.: CNN Universal Chips crank up the computing power. IEEE Circuits and Devices Magazine 12(4), 18-28 (1996)
[25]
Cellular Wave Computers for Nano-Tera-Scale Technology - beyond spatial-temporal logic in million processor devices. Electronics Letters 43(8) (April 12, 2007)
[26]
Roska, T.: Private communication
[27]
Xavier de Souza, S., Yalcin, M., Suykens, J., Vandewalle, J.: Toward CNN Chip-Specific Robustness. IEEE Trans. on Circuits and Systems - I 51(5), 892-902 (2004)
[28]
Hillier, D., Xavier de Souza, S., Suykens, J., Vandewalle, J.: CNNOPT Learning CNN Dynamics and Chip-Specific Robustness. In: International Workshop on Cellular Neural Networks and Their Applications (2006)
[29]
Csaba, G., Ju, X., Chen, Q., Porod, W., Schmidhuber, J., Lugli, P., Rührmair, U.: On-Chip ElectricWaves: An Analog Circuit Approach to Physical Uncloneable Functions. Report No. 2009/246 (2009), http://eprint.iacr.org/
[30]
Roska, T.: Cellular Wave Computers for Brain-Like Spatial-Temporal Sensory Computing. IEEE Circuits and Systems Magazine 5(2), 5-19 (2005)
[31]
Virtuoso Spectre Circuit Simulator, Cadence Design Systems, http://www.cadence.com

Cited By

View all
  • (2022)A secure authentication scheme based on differential public PUFProceedings of the 19th ACM International Conference on Computing Frontiers10.1145/3528416.3530993(263-269)Online publication date: 17-May-2022
  • (2012)SIMPL systems as a keyless cryptographic and security primitiveCryptography and Security10.5555/2184081.2184108(329-354)Online publication date: 1-Jan-2012
  • (2011)SIMPL systems, orProceedings of the 37th international conference on Current trends in theory and practice of computer science10.5555/1946370.1946373(26-45)Online publication date: 22-Jan-2011

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
WISTP'10: Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
April 2010
383 pages
ISBN:3642123678
  • Editors:
  • Pierangela Samarati,
  • Michael Tunstall,
  • Joachim Posegga,
  • Konstantinos Markantonakis,
  • Damien Sauveron

Sponsors

  • Vodaphone: Vodaphone

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 12 April 2010

Author Tags

  1. SIMPL systems
  2. physical cryptography
  3. physical unclonable functions
  4. public key systems

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 26 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2022)A secure authentication scheme based on differential public PUFProceedings of the 19th ACM International Conference on Computing Frontiers10.1145/3528416.3530993(263-269)Online publication date: 17-May-2022
  • (2012)SIMPL systems as a keyless cryptographic and security primitiveCryptography and Security10.5555/2184081.2184108(329-354)Online publication date: 1-Jan-2012
  • (2011)SIMPL systems, orProceedings of the 37th international conference on Current trends in theory and practice of computer science10.5555/1946370.1946373(26-45)Online publication date: 22-Jan-2011

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media