Identification and authentication of integrated circuits
نویسندگان
چکیده
This paper describes a technique to reliably and securely identify individual integrated circuits (ICs) based on the precise measurement of circuit delays and a simple challenge–response protocol. This technique could be used to produce key-cards that are more difficult to clone than ones involving digital keys on the IC. We consider potential venues of attack against our system, and present candidate implementations. Experiments on Field Programmable Gate Arrays show that the technique is viable, but that our current implementations could require some strengthening before it can be considered as secure. Copyright c © 2004 John Wiley & Sons, Ltd.
منابع مشابه
A MEMS Capacitive Microphone Modelling for Integrated Circuits
In this paper, a model for MEMS capacitive microphone is presented for integrated circuits. The microphone has a diaphragm thickness of 1 μm, 0.5 × 0.5 mm2 dimension, and an air gap of 1.0 μm. Using the analytical and simulation results, the important features of MEMS capacitive microphone such as pull-in voltage and sensitivity are obtained 3.8v and 6.916 mV/Pa, respectively while there is no...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملTrusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach
We have developed a methodology for unique identification of integrated circuits (ICs) that addresses untrusted fabrication and other security problems. The new method leverages nondestructive gate-level characterization of ICs post-manufacturing, revealing the hidden and unclonable uniqueness of each IC. The IC characterization uses the externally measured leakage currents for multiple input v...
متن کاملA Temperature Compensation Voltage Controlled Oscillator Using a Complementary to Absolute Temperature Voltage Reference
This paper presents a temperature compensation voltage controlled oscillator (VCO) based on Cross-Coupled pair and Colpitts structures which is suitable for military fields. Also, two inductors have been used for increasing the negative conductance. By using this method, start-up condition has been improved. Two varactors and a simple capacitor bank are applied for covering a wide tunning range...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Concurrency - Practice and Experience
دوره 16 شماره
صفحات -
تاریخ انتشار 2004