基于物理不可克隆函数与真随机数发生器的身份验证系统

 2022-07-18 12:07

论文总字数:26191字

摘 要

随着物联网(IoT)技术的快速发展,电子设备的安全性变得越来越重要。芯片在生产制造中会引入一些随机特征,物理不可克隆函数可以从中提取出每个芯片独有的签名指纹信息,这些芯片独有的签名指纹信息拥有极强的安全性,而在芯片运行过程中含有的随机特征可被提取来生成随机数,这两种电路都可使整个系统的安全性能大大提升。

本文的主要任务是设计基于物理不可克隆函数与真随机数发生器的身份验证系统,将介绍整个系统的设计流程和算法设计方案,并展示本系统的测试结果以及对前景的展望。物理不可克隆函数可产生物理指纹数据作为RSA对称加密算法以及椭圆加密算法生成加密密钥的密钥种子,由于非对称加密算法的加密特性,使得整个身份验证系统在密钥储存和通信方面的安全性大大提升。

本身份验证系统既包含硬件设计也包含软件层次。硬件上使用了树莓派3以及芯片测量板,软件上包含通过Python语言编写的相关程序。整个系统共通过了16316次系统测试,并且并未发生任何错误。本系统的创新之处在于第一次将物理不可克隆函数与真随机数发生器结合在一起,应用于身份验证系统之中,并使用了非对称加密算法RSA和ECC来构建高安全特性系统。

关键词:物理不可克隆函数,真随机数发生器,授权验证系统,非对称加密

Abstract

With the development of IoT (Internet of Things), the security of devices becomes more and more important. PUF (Physical Unclonable Function) extract chip-unique signatures from integrated circuits (ICs) by exploiting the uncontrollable randomness due to manufacturing process variations. These signatures can be used for hardware authentication. TRNG (True Random Number Generator) extract random signals when chips are running. Both this two kinds of chips can be implemented to increase system’s security.

In this paper, it’ll introduce an asymmetric cryptography authentication system, including the background, motivation, system design, algorithm design, test result and future work. This is the first time using PUF on the client side, and TRNG on the server side to build the authentication system. PUF is used as a seed in RSA algorithm and Eclipse Curve Cryptograph. Because of the characteristics of asymmetric cryptography, key storage and transmission become more secure.

This system implements the system from hardware layer to software layer. The hardware layer consists of Raspberry Pi3 and DUT board, the software layer consists of programs written in Python. This system passed 16136 times system test without any error occurred. The innovation of this system is the first time combining the TRNG and PUF together into authentication system and use the asymmetric cryptography algorithm RSA/ECC) to build a high-security system.

Key Words: Physical Unclonable Functions, TRNG, Authentication system, Asymmetric Cryptography Algorithm.

目 录

摘要…………………………………………………………………………………………………...I

Abstract………………………………………………………………………………………………II

目录…………………………………………………………………………………………………III

第一章 绪论………………………………………………………………………………………....1

1.1引言………………………………………………………………………………………….1

1.2物理不可克隆函数与真随机数发生器…………………………………………………….2

1.3设计背景…………………………………………………………………………………….3

1.3.1安全应用……………………………………………………………………………...3

1.3.2过去的工作…………………………………………………………………………...4

1.4论文组织结构…………………………………………………………………………….…7

第二章 物理不可克隆函数与真随机数发生器……………………………………………………8

2.1物理不可克隆函数………………………………………………………………………….8

2.2真随机数发生器…………………………………………………………………………...11

第三章 加密算法设计……………………………………………………………………………..14

3.1密钥生成算法……………………………………………………………………………...14

3.2加密算法…………………………………………………………………………………...15

3.2.1 RSA加密算法………………………………………………………………………15

3.2.2 AKS素性加密算法…………………………………………………………………15

3.2.3 椭圆加密算法………………………………………………………………………16

第四章 授权系统设计……………………………………………………………………………..18

4.1系统结构…………………………………………………………………………………...18

4.2软件结构…………………………………………………………………………………...18

4.3硬件结构…………………………………………………………………………………...20

4.4程序设计…………………………………………………………………………………...22

第五章 系统测试……………………………………………………...…………………………...24

5.1测量设计…………………………………………………………………………………...24

5.2测量结果…………………………………………………………………………………...26

5.3程序优化…………………………………………………………………………………...26

5.4结论………………………………………………………………………………………...27

第六章 工作总结和展望…………………………………………………………………………..28

6.1工作总结…………………………………………………………………………………...28

6.2研究展望…………………………………………………………………………………...28

致谢…………………………………………………………………………………........................29

参考文献…………………………………………………………………………………................30

第一章 绪论

剩余内容已隐藏,请支付后下载全文,论文总字数:26191字

您需要先支付 80元 才能查看全部内容!立即支付

该课题毕业论文、开题报告、外文翻译、程序设计、图纸设计等资料可联系客服协助查找;