全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
-  2015 

基于Nand Flash物理特性的签名私钥产生方法及其应用
Signature private key generation method based on the physical properties of Nand Flash and its applications

DOI: 10.7523/j.issn.2095-6134.2015.05.017

Keywords: Nand Flash,SM2,随机数,数字签名
Nand Flash
,SM2,random number,digital signature

Full-Text   Cite this paper   Add to My Lib

Abstract:

摘要 Nand Flash是消费类电子设备常用的非易失性存储器件.利用Nand Flash芯片生产过程中所确定的物理特性,能够提取每芯片唯一的数字指纹信息.本文基于这种特性提出利用Nand Flash芯片的数字指纹产生SM2签名私钥的方法.这种方法提取的SM2签名私钥与Nand Flash器件具有可验证的紧耦合特征.本方法与具体的数字签名算法无关,可以应用在任何需要对存储器件或电子设备本身进行基于数字签名的身份鉴别的场合之中.

References

[1]  Lee B, Son K, Won D, et al. Secure data deletion for USB flash memory[J]. J Inf Sci Eng, 2011, 27(3):933-952.
[2]  Reardon J, Capkun S, Basin D A. Data node encrypted file system:Efficient secure deletion for flash memory[C]//USENIX Security Symposium. 2012:333-348.
[3]  Gal E, Toledo S. Algorithms and data structures for flash memories[J]. ACM Computing Surveys (CSUR), 2005, 37(2):138-163.
[4]  Lee J W, Lim D, Gassend B, et al. A technique to build a secret key in integrated circuits for identification and authentication applications[C]//VLSI Circuits, 2004. Digest of Technical Papers, 2004 Symposium on. IEEE, 2004:176-179.</p>
[5]  <p> Bucci M, Germani L, Luzzi R, et al. A high-speed oscillator-based truly random number source for cryptographic applications on a smart card IC[J]. Computers, IEEE Transactions on, 2003, 52(4):403-409.
[6]  Wang Y, Yu W, Xu S Q, et al. Hiding information in flash memory[C]//Security and Privacy (SP), 2013 IEEE Symposium on. IEEE, 2013:271-285.
[7]  Prabhu P, Akel A, Grupp L M, et al. Extracting device fingerprints from flash memory by exploiting physical variations[C]//Trust and Trustworthy Computing. Springer Berlin Heidelberg, 2011:188-201.
[8]  Wang Y, Yu W, Wu S, et al. Flash memory for ubiquitous hardware security functions:true random number generation and device fingerprints[C]//Security and Privacy (SP), 2012 IEEE Symposium on. IEEE, 2012:33-47.
[9]  Suh G E, Devadas S. Physical unclonable functions for device authentication and secret key generation[C]//Proceedings of the 44th annual Design Automation Conference. ACM, 2007:9-14.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133