新颖性
保密
计算机科学
钥匙(锁)
密码学
物理不可克隆功能
硬件安全模块
分布式计算
密钥生成
嵌入式系统
计算机安全
神学
哲学
作者
Jeroen Delvaux,Dawu Gu,Dries Schellekens,Ingrid Verbauwhede
标识
DOI:10.1109/tcad.2014.2370531
摘要
Security-critical products rely on the secrecy and integrity of their cryptographic keys. This is challenging for low-cost resource-constrained embedded devices, with an attacker having physical access to the integrated circuit (IC). Physically, unclonable functions are an emerging technology in this market. They extract bits from unavoidable IC manufacturing variations, remarkably analogous to unique human fingerprints. However, post-processing by helper data algorithms (HDAs) is indispensable to meet the stringent key requirements: reproducibility, high-entropy, and control. The novelty of this paper is threefold. We are the first to provide an in-depth and comprehensive literature overview on HDAs. Second, our analysis does expose new threats regarding helper data leakage and manipulation. Third, we identify several hiatuses/open problems in existing literature.
科研通智能强力驱动
Strongly Powered by AbleSci AI