A 9-MHz Temperature Insensitive Hybrid Ring Oscillator for the On-Chip Clock

Author(s):  
Rui Wang ◽  
Bo Wang ◽  
Kanglin Xiao ◽  
Hai Rui Wang ◽  
Jun Yao Wang ◽  
...  
Keyword(s):  
On Chip ◽  
Author(s):  
Xiaoxiao Wang ◽  
Pengyuan Jiao ◽  
Mehdi Sadi ◽  
Donglin Su ◽  
LeRoy Winemberg ◽  
...  
Keyword(s):  
Ir Drop ◽  

Author(s):  
Paul Clapera ◽  
Soumya Ray ◽  
Xavier Jehl ◽  
Marc Sanquer ◽  
Alexandre Valentian ◽  
...  

Sensors ◽  
2010 ◽  
Vol 10 (11) ◽  
pp. 10095-10104 ◽  
Author(s):  
Ming-Zhi Yang ◽  
Ching-Liang Dai ◽  
De-Hao Lu

Sensors ◽  
2009 ◽  
Vol 9 (12) ◽  
pp. 10158-10170 ◽  
Author(s):  
Ching-Liang Dai ◽  
Po-Wei Lu ◽  
Chienliu Chang ◽  
Cheng-Yang Liu

Cryptography ◽  
2018 ◽  
Vol 2 (3) ◽  
pp. 15 ◽  
Author(s):  
Don Owen Jr. ◽  
Derek Heeger ◽  
Calvin Chan ◽  
Wenjie Che ◽  
Fareena Saqib ◽  
...  

Secure booting within a field-programmable gate array (FPGA) environment is traditionally implemented using hardwired embedded cryptographic primitives and non-volatile memory (NVM)-based keys, whereby an encrypted bitstream is decrypted as it is loaded from an external storage medium, e.g., Flash memory. A novel technique is proposed in this paper that self-authenticates an unencrypted FPGA configuration bitstream loaded into the FPGA during the start-up. The internal configuration access port (ICAP) interface is accessed to read out configuration information of the unencrypted bitstream, which is then used as input to a secure hash function SHA-3 to generate a digest. In contrast to conventional authentication, where the digest is computed and compared with a second pre-computed value, we use the digest as a challenge to a hardware-embedded delay physical unclonable function (PUF) called HELP. The delays of the paths sensitized by the challenges are used to generate a decryption key using the HELP algorithm. The decryption key is used in the second stage of the boot process to decrypt the operating system (OS) and applications. It follows that any type of malicious tampering with the unencrypted bitstream changes the challenges and the corresponding decryption key, resulting in key regeneration failure. A ring oscillator is used as a clock to make the process autonomous (and unstoppable), and a novel on-chip time-to-digital-converter is used to measure path delays, making the proposed boot process completely self-contained, i.e., implemented entirely within the re-configurable fabric and without utilizing any vendor-specific FPGA features.


Sign in / Sign up

Export Citation Format

Share Document