Spelling suggestions: "subject:"physical unclos function""
11 |
Designing a Physical Unclonable Function for Cryptographic HardwareBergfalck, Ludwig, Engström, Johannes January 2021 (has links)
Hardware Security Modules (HSMs) are embedded systems that provide a physically secure data storage and handling environment. This master thesis evaluates an HSM method incorporating cryptographic key generation, key management, and tamper protection. The HSM concept involves a sensing mesh structured Physical Unclonable Function (PUF), where the cryptographic key is derived from the sum of cross-sectional area capacitance between conductors on adjacent layers of a flex PCB forming a grid. This sensing mesh PUF that stores a digital fingerprint in its microstructure is used to enclose an internal system extracting and managing the keys. This ensures that accessing the internal structure is unmanageable without modifying the enclosure. Since the cryptographic key is derived from the intrinsic properties within the sensing mesh, modifying it will change its intrinsic properties and change the cryptographic key and make it unusable. The Master thesis contains PCB design and development of a prototype of the PUF system and an associated capacitance measurement system, which can handle and extract unique keys from each copy of the PUFs. A hardware assembling, experimenting, and evaluation procedure were performed regarding the robustness of the PUF and its susceptibility to environmental impacts such as temperature changes, invasive attacks, and agitation. Additionally, an performance evaluation is made by estimating a set of quality factors often associated with PUFs, such as uniqueness, reliability, uniformity, and bit-aliasing on the extracted cryptographic keys. The cryptographic keys provide good reliability in stable conditions for each PUF copy of the population. The cryptographic keys also provide gooduniqueness, uniformity, and bit-aliasing estimations with the quality factors. Moreover, an invasive attack experiment indicates that the PUF enclosure prototype provides tamper detection possibilities together with distinct structure modifications when an intrusion attempt is performed. As stated in theory, PUFs are sensitive to environmental changes, which is also observable in the results when the PUF enclosure prototype is exposed to various environmental conditions. / <p>Examensarbetet är utfört vid Institutionen för teknik och naturvetenskap (ITN) vid Tekniska fakulteten, Linköpings universitet</p>
|
12 |
Asynchronous Physical Unclonable Function using FPGA-based Self-Timed Ring OscillatorSilwal, Roshan 27 November 2013 (has links)
No description available.
|
13 |
System Architecture for Asset Traceability using Digital Product Passports and Fingerprint TechnologyMarco Fabio Buecheler (20290857) 19 November 2024 (has links)
<p dir="ltr">Asset traceability systems support sustainable value creation. Use case scenarios include the transition from a linear to a circular economy (CE) and legislative initiatives in Europe and North America. Traceability systems are needed to consistently link physical assets with the corresponding digital life cycle data. However, there is a lack of system architectures for consistent asset life cycle traceability. Therefore, the work proposes a traceability system architecture using digital product passports (DPPs) and fingerprint (FP) technology. By providing asset related data, DPPs increase the transparency across value chain partners. The system architecture uses the Asset Administration Shell (AAS) to create interoperable and standardized DPPs. Besides, consistent product identification (ID) and unique (single occurrence) identifiers are a prerequisite for effective traceability systems. Using natural markers to identify assets can enhance consistent asset traceability in sustainable supply chains. When using FP technology, the inherent surface structure of an asset is captured by an imaging system and then compressed into a digital asset fingerprint. Since assets are not artificially marked, the work investigates the use of Bounding Symbols (BSs) to locate an asset’s fingerprint Region of Interest (ROI). Furthermore, four fingerprint creation algorithms are compared and evaluated regarding their feasibility for asset life cycle traceability. The research validates the proposed system architecture in an experimental setup by using aluminum raw castings (medallions) as the investigated asset type. Key findings include the successful identification of 80 medallions with a 100% success rate. The related fingerprint information was stored in a DPP as an AAS submodel.</p>
|
14 |
Applications of Complex Network Dynamics in Ultrafast ElectronicsCharlot, Noeloikeau Falconer 08 September 2022 (has links)
No description available.
|
Page generated in 0.1083 seconds