Trusted root and trusted computing platform architecture design based on physical unclonable function

Physical Unclonable Functions(PUFs) are highly flexible in applications such as device authentication and secure key storage, and are widely used in embedded system security. In this paper, we use PUF technology to provide the root of trust(RoT) for dual-core security architecture, and design the ch...

Full description

Bibliographic Details
Main Authors: Wu Jin, Xu Jinfu
Format: Article
Language:zho
Published: National Computer System Engineering Research Institute of China 2018-09-01
Series:Dianzi Jishu Yingyong
Subjects:
PUF
Online Access:http://www.chinaaet.com/article/3000089911
id doaj-9fa4e34a1e69443a8c2dfdca40e4e3c7
record_format Article
spelling doaj-9fa4e34a1e69443a8c2dfdca40e4e3c72020-11-25T01:52:55ZzhoNational Computer System Engineering Research Institute of ChinaDianzi Jishu Yingyong0258-79982018-09-01449343810.16157/j.issn.0258-7998.1750753000089911Trusted root and trusted computing platform architecture design based on physical unclonable functionWu Jin0Xu Jinfu1The PLA Information Engineering University,Zhengzhou 450001,ChinaThe PLA Information Engineering University,Zhengzhou 450001,ChinaPhysical Unclonable Functions(PUFs) are highly flexible in applications such as device authentication and secure key storage, and are widely used in embedded system security. In this paper, we use PUF technology to provide the root of trust(RoT) for dual-core security architecture, and design the chain of trust and key update protocol based on PUF-based RoT, to ensure the gradual extension of trusted relationship and the reliability and security of secure boot on SoC system. The experimental results show that PUF-based RoT can operate in a dual-core isolated SoC system with a small TCB, and its random number seed and unique device key are resistant to multiple attacks. It proves that the PUF can provide the security and flexibility RoT for the embedded system.http://www.chinaaet.com/article/3000089911PUFthe root of trustthe chain of trusttrusted computing
collection DOAJ
language zho
format Article
sources DOAJ
author Wu Jin
Xu Jinfu
spellingShingle Wu Jin
Xu Jinfu
Trusted root and trusted computing platform architecture design based on physical unclonable function
Dianzi Jishu Yingyong
PUF
the root of trust
the chain of trust
trusted computing
author_facet Wu Jin
Xu Jinfu
author_sort Wu Jin
title Trusted root and trusted computing platform architecture design based on physical unclonable function
title_short Trusted root and trusted computing platform architecture design based on physical unclonable function
title_full Trusted root and trusted computing platform architecture design based on physical unclonable function
title_fullStr Trusted root and trusted computing platform architecture design based on physical unclonable function
title_full_unstemmed Trusted root and trusted computing platform architecture design based on physical unclonable function
title_sort trusted root and trusted computing platform architecture design based on physical unclonable function
publisher National Computer System Engineering Research Institute of China
series Dianzi Jishu Yingyong
issn 0258-7998
publishDate 2018-09-01
description Physical Unclonable Functions(PUFs) are highly flexible in applications such as device authentication and secure key storage, and are widely used in embedded system security. In this paper, we use PUF technology to provide the root of trust(RoT) for dual-core security architecture, and design the chain of trust and key update protocol based on PUF-based RoT, to ensure the gradual extension of trusted relationship and the reliability and security of secure boot on SoC system. The experimental results show that PUF-based RoT can operate in a dual-core isolated SoC system with a small TCB, and its random number seed and unique device key are resistant to multiple attacks. It proves that the PUF can provide the security and flexibility RoT for the embedded system.
topic PUF
the root of trust
the chain of trust
trusted computing
url http://www.chinaaet.com/article/3000089911
work_keys_str_mv AT wujin trustedrootandtrustedcomputingplatformarchitecturedesignbasedonphysicalunclonablefunction
AT xujinfu trustedrootandtrustedcomputingplatformarchitecturedesignbasedonphysicalunclonablefunction
_version_ 1724992043819728896