• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4
  • Tagged with
  • 7
  • 7
  • 7
  • 5
  • 4
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Cryptographic Primitives from Physical Variables

Hammouri, Ghaith 02 June 2009 (has links)
" In this dissertation we explore a new paradigm emerging from the subtleties of cryptographic implementations and relating to theoretical aspects of cryptography. This new paradigm, namely physical variables (PVs), simply describes properties of physical objects designed to be identical but are not due to manufacturing variability. In the first part of this dissertation, we focus our attention on scenarios which require the unique identification of physical objects and we show how Gaussian PVs can be used to fulfill such a requirement. Using this framework we present and analyze a new technique for fingerprinting compact discs (CDs) using the manufacturing variability found in the length of the CDs' lands and pits. Although the variability measured is on the order of 20 nm, the technique does not require the use of microscopes or any advanced equipment. Instead, the electrical signal produced by the photo-detector inside the CD reader will be sufficient to measure the desired variability. We thoroughly investigate the new technique by analyzing data collected from 100 identical CDs and show how to extract a unique fingerprint for each CD. In the second part, we shift our attention to physically parameterized functions (PPFs). Although all the constructions we provide are centered around delay-based physically unclonable functions (PUFs), we stress that the use of the term PUF could be misleading as most circuits labeled with the term PUF are in reality clonable on the protocol level. We argue that using a term like PPFs to describe functions parameterized by a PV is a more accurate description. Herein, we thoroughly analyze delay-PUFs and use a mathematical framework to construct two authentication protocols labeled PUF-HB and HB+PUF. Both these protocols merge the known HB authentication family with delay-based PUFs. The new protocols enjoy the security reduction put forth by the HB portion of the protocol and at the same time maintain a level of hardware security provided by the use of PUFs. We present a proof of concept implementation for HB+PUF which takes advantage of the PUF circuit in order to produce the random bits typically needed for an HB-based authentication scheme. The overall circuit is shown to occupy a few thousand gates. Finally, we present a new authentication protocol that uses 2-level PUF circuits and enables a security reduction which, unlike the previous two protocols, stems naturally from the usage of PVs. "
2

Tailored Traceability and Provenance Determination in Manufacturing

Adam Dachowicz (9139691) 29 July 2020 (has links)
<p>Anti-counterfeiting and provenance determination are serious concerns in many industries, including automotive, aerospace, and defense. These concerns are addressed by ensuring traceability during manufacturing, transport, and use of goods. In increasingly globalized manufacturing contexts, one-size-fits-all traceability solutions are not always appropriate. Manufacturers may not have the means to re-tool production to meet marking, tagging, or other traceability requirements. This is especially true when manufacturers require high processing flexibility to produce specialized parts, as is increasingly the case in modern supply chains. Counterfeiters and saboteurs, meanwhile, have a growing attack surface over which to interfere with existing supply chains, and have a leg up when implementation details of traceability methods are widely known. There is a growing need to provide solutions to traceability that i) are particularized to specific industrial contexts with heterogeneous security and robustness requirements, and ii) reliably transmit information needed for traceability throughout the product life cycle. </p> <p><br></p><p>This dissertation presents investigations into tailorable traceability schemes for modern manufacturing, with a focus on applications in additive manufacturing. The primary contributions of this dissertation are frameworks for designing traceability schemes that i) achieve traceability through recovery of manufacturer-specified signals, from simple identity information to more detailed strings of provenance data, and ii) are tuned to maximize information carrying capacity subject to the available data and intended use cases faced by the manufacturer.</p> <p><br></p><p>In the vein of physically unclonable function (PUF) literature, these frameworks leverage the intrinsic information present in material structure, such as phase or grain statistics. These structures, being functions of largely random and uncontrollable physical and chemical processes, are by their nature uncontrollable by a manufacturer. According to the frameworks proposed in this dissertation, anti-counterfeiting and traceability schemes are designed by extracting large libraries of features from these properties, and designing methods for identifying parts based on a subset of the extracted features that demonstrate good utility for the present use case. Such schemes are customized to handle specific material systems, metrology, expected part damage, and other concerns raised by a manufacturer or other supply chain stakeholders.</p> <p><br></p><p>First, this dissertation presents a framework that leverages this intrinsic information, and models for damage that may occur during use, for designing schemes for genuinity determination. Such schemes are useful in contexts like anti-counterfeiting and part tracing. Once this framework is established, it is then extended to design schemes for dynamically and securely embedding manufacturer-specified messages during the manufacturing process, with a focus on implementation in additive manufacturing. Such schemes leverage both the intrinsic information inherent to the material / manufacturing process and extrinsically introduced information. This extrinsic information may include cryptographic keys, message information, and specifications regarding how an authorized user may read the embedded message. The resulting embedding schemes are formalized as "malleable PUFs.'' </p> <p><br></p><p>The outcomes of these investigations are frameworks for designing, evaluating, and implementing traceability schemes that can be used by manufacturers, academics, and other stakeholders seeking to implement secure and informative traceability schemes subject to their own unique constraints. Importantly, these frameworks can be adapted for a range of industrial contexts, and can be readily extended as new methods for in-situ measurement and control in additive manufacturing are developed.</p>
3

Modelling and characterization of physically unclonable functions / Modélisation et caractérisation des fonctions non clonables physiquement

Cherif, Zouha 08 April 2014 (has links)
Les fonctions non clonables physiquement, appelées PUF (Physically Unclonable Functions), représentent une technologie innovante qui permet de résoudre certains problèmes de sécurité et d’identification. Comme pour les empreintes humaines, les PUF permettent de différencier des circuits électroniques car chaque exemplaire produit une signature unique. Ces fonctions peuvent être utilisées pour des applications telles que l’authentification et la génération de clés cryptographiques. La propriété principale que l’on cherche à obtenir avec les PUF est la génération d’une réponse unique qui varie de façon aléatoire d’un circuit à un autre, sans la possibilité de la prédire. Une autre propriété de ces PUF est de toujours reproduire, quel que soit la variation de l’environnement de test, la même réponse à un même défi d’entrée. En plus, une fonction PUF doit être sécurisée contre les attaques qui permettraient de révéler sa réponse. Dans cette thèse, nous nous intéressons aux PUF en silicium profitant des variations inhérentes aux technologies de fabrication des circuits intégrés CMOS. Nous présentons les principales architectures de PUF, leurs propriétés, et les techniques mises en œuvre pour les utiliser dans des applications de sécurité. Nous présentons d’abord deux nouvelles structures de PUF. La première structure appelée “Loop PUF” est basée sur des chaînes d’éléments à retard contrôlés. Elle consiste à comparer les délais de chaînes à retard identiques qui sont mises en série. Les points forts de cette structure sont la facilité de sa mise en œuvre sur les deux plates-formes ASIC et FPGA, la grande flexibilité pour l’authentification des circuits intégrés ainsi que la génération de clés de chiffrement. La deuxième structure proposée “TERO PUF” est basée sur le principe de cellules temporairement oscillantes. Elle exploite la métastabilité oscillatoire d’éléments couplés en croix, et peut aussi être utilisée pour un générateur vrai d’aléas (TRNG). Plus précisément, la réponse du PUF profite de la métastabilité oscillatoire introduite par une bascule SR lorsque les deux entrées S et R sont connectées au même signal d’entrée. Les résultats expérimentaux montrent le niveau de performances élevé des deux structures de PUF proposées. Ensuite, afin de comparer équitablement la qualité des différentes PUF à retard, nous proposons une méthode de caractérisation spécifique. Elle est basée sur des mesures statistiques des éléments à retard. Le principal avantage de cette méthode vient de sa capacité à permettre au concepteur d’être sûr que la fonction PUF aura les performances attendues avant sa mise en œuvre et sa fabrication. Enfin, en se basant sur les propriétés de non clonabilité et de l’imprévisibilité des PUF, nous présentons de nouvelles techniques d’authentification et de génération de clés de chiffrement en utilisant la “loop PUF” proposée. Les résultats théoriques et expérimentaux montrent l’efficacité des techniques introduites en termes de complexité et de fiabilité / Physically Unclonable Functions, or PUFs, are innovative technologies devoted to solve some security and identification issues. Similarly to a human fingerprint, PUFs allows to identify uniquely electronic devices as they produce an instance-specific signature. Applications as authentication or key generation can take advantage of this embedded function. The main property that we try to obtain from a PUF is the generation of a unique response that varies randomly from one physical device to another without allowing its prediction. Another important property of these PUF is to always reproduce the same response for the same input challenge even in a changing environment. Moreover, the PUF system should be secure against attacks that could reveal its response. In this thesis, we are interested in silicon PUF which take advantage of inherent process variations during the manufacturing of CMOS integrated circuits. We present several PUF constructions, discuss their properties and the implementation techniques to use them in security applications. We first present two novel PUF structures. The first one, called “Loop PUF” is a delay based PUF which relies on the comparison of delay measurements of identical serial delay chains. The major contribution brought by the use of this structure is its implementation simplicity on both ASIC and FPGA platforms, and its flexibility as it can be used for reliable authentication or key generation. The second proposed structure is a ring-oscillator based PUF cells “TERO PUF”. It exploits the oscillatory metastability of cross-coupled elements, and can also be used as True Random Number Generator (TRNG). More precisely, the PUF response takes advantage from the introduced oscillatory metastability of an SR flip-flop when the S and R inputs are connected to the same input signal. Experimental results show the high performance of these two proposed PUF structures. Second, in order to fairly compare the quality of different delay based PUFs, we propose a specific characterization method. It is based on statistical measurements on basic delay elements. The main benefit of this method is that it allows the designer to be sure that the PUF will meet the expected performances before its implementation and fabrication. Finally, Based on the unclonability and unpredictability properties of the PUFs, we present new techniques to perform “loop PUF” authentication and cryptographic key generation. Theoretical and experimental results show the efficiency of the introduced techniques in terms of complexity and reliability
4

EMBEDDED INCREASED ENTROPY PHYSICALLY UNCLONABLE FUNCTIONS

Harding, Jessica Catherine 26 August 2022 (has links)
No description available.
5

Hardware-based Authentication and Security for Advanced Metering Infrastructure

Deb Nath, Atul Prasad January 2016 (has links)
No description available.
6

Memory-based Hardware-intrinsic Security Mechanisms for Device Authentication in Embedded Systems

Soubhagya Sutar (9187907) 30 July 2020 (has links)
<div>The Internet-of-Things (IoT) is one of the fastest-growing technologies in computing, revolutionizing several application domains such as wearable computing, home automation, industrial manufacturing, <i>etc</i>. This rapid proliferation, however, has given rise to a plethora of new security and privacy concerns. For example, IoT devices frequently access sensitive and confidential information (<i>e.g.,</i> physiological signals), which has made them attractive targets for various security attacks. Moreover, with the hardware components in these systems sourced from manufacturers across the globe, instances of counterfeiting and piracy have increased steadily. Security mechanisms such as device authentication and key exchange are attractive options for alleviating these challenges.</div><div><br></div><div>In this dissertation, we address the challenge of enabling low-cost and low-overhead device authentication and key exchange in off-the-shelf embedded systems. The first part of the dissertation focuses on a hardware-intrinsic mechanism and proposes the design of two Physically Unclonable Functions (PUFs), which leverage the memory (DRAM, SRAM) in the system, thus, requiring minimal (or no) additional hardware for operation. Two lightweight authentication and error-correction techniques, which ensure robust operation under wide environmental and temporal variations, are also presented. Experimental results obtained from prototype implementations demonstrate the effectiveness of the design. The second part of the dissertation focuses on the application of these techniques in real-world systems through a new end-to-end authentication and key-exchange protocol in the context of an Implantable Medical Device (IMD) ecosystem. Prototype implementations exhibit an energy-efficient design that guards against security and privacy attacks, thereby making it suitable for resource-constrained devices such as IMDs.</div><div><br></div>
7

Hardware-Aided Approaches for Unconditional Confidentiality and Authentication

Bendary, Ahmed January 2021 (has links)
No description available.

Page generated in 0.1485 seconds