{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T10:24:57Z","timestamp":1750501497517,"version":"3.37.3"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,11,26]],"date-time":"2019-11-26T00:00:00Z","timestamp":1574726400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,11,26]],"date-time":"2019-11-26T00:00:00Z","timestamp":1574726400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Hardw Syst Secur"],"published-print":{"date-parts":[[2019,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In today\u2019s globalized integrated circuit (IC) ecosystem, untrusted foundries are often procured to build critical systems since they offer state-of-the-art silicon with the best performance available. On the other hand, ICs that originate from trusted fabrication cannot match the same performance level since trusted fabrication is often available on legacy nodes. Split-Chip is a dual-IC approach that leverages the performance of an untrusted IC and combines it with the guaranties of a trusted IC. In this paper, we provide a framework for chip-to-chip authentication that can further improve a Split-Chip system by protecting it from attacks that are unique to Split-Chip. A hardware implementation that utilizes an SRAM-based PUF as an identifier and public key cryptography for handshake is discussed. Circuit characteristics are provided, where the trusted IC is designed in a 28-nm CMOS technology and the untrusted IC is designed in an also commercial 16-nm CMOS technology. Most importantly, our solution does not require a processor for performing any of the handshake or cryptography tasks, thus being not susceptible to software vulnerabilities and exploits.<\/jats:p>","DOI":"10.1007\/s41635-019-00080-y","type":"journal-article","created":{"date-parts":[[2019,11,16]],"date-time":"2019-11-16T03:01:28Z","timestamp":1573873288000},"page":"382-396","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Chip-to-Chip Authentication Method Based on SRAM PUF and Public Key Cryptography"],"prefix":"10.1007","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8546-8491","authenticated-orcid":false,"given":"Ioannis","family":"Karageorgos","sequence":"first","affiliation":[]},{"given":"Mehmet M.","family":"Isgenc","sequence":"additional","affiliation":[]},{"given":"Samuel","family":"Pagliarini","sequence":"additional","affiliation":[]},{"given":"Larry","family":"Pileggi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,26]]},"reference":[{"key":"80_CR1","unstructured":"Crawford M, Telesco T, Nelson C, Bolton J, Bagin K, Botwin B (2010) Defense industrial base assessment: counterfeit electronics. In: Reports of the U.S. Department of Commerce"},{"key":"80_CR2","doi-asserted-by":"crossref","unstructured":"Skorobogatov S, Woods C (2012) Breakthrough silicon scanning discovers backdoor in military chip. In: Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","DOI":"10.1007\/978-3-642-33027-8_2"},{"key":"80_CR3","unstructured":"Levin C et al (2012) Inquiry into counterfeit electronic parts in the Department of Defense supply chain. In: Senate Report of the Committee on Armed Services"},{"issue":"1","key":"80_CR4","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MDT.2010.7","volume":"27","author":"M Tehranipoor","year":"2010","unstructured":"Tehranipoor M, Koushanfar F (2010) A survey of hardware trojan taxonomy and detection. IEEE Des Test Comput 27(1):10\u201325","journal-title":"IEEE Des Test Comput"},{"issue":"10","key":"80_CR5","doi-asserted-by":"publisher","first-page":"1493","DOI":"10.1109\/TCAD.2009.2028166","volume":"28","author":"RS Chakraborty","year":"2009","unstructured":"Chakraborty RS, Bhunia S (2009) HARPOON: An obfuscation-based SoC design methodology for hardware protection. IEEE Trans Comput-Aided Des Integr Circ Syst 28(10):1493\u20131502","journal-title":"IEEE Trans Comput-Aided Des Integr Circ Syst"},{"issue":"10","key":"80_CR6","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MC.2010.284","volume":"43","author":"Jarrod A. Roy","year":"2010","unstructured":"Roy JA, Koushanfar F, Markov IL (Oct 2010) Ending piracy of integrated circuits. Computer 43 (10):30\u201338","journal-title":"Computer"},{"key":"80_CR7","doi-asserted-by":"crossref","unstructured":"Vaidyanathan K, Das BP, Sumbul E, Liu R, Pileggi L (2014) Building trusted ICs using split fabrication. In: IEEE Int. Symp. on Hardware-Oriented Security and Trust (HOST)","DOI":"10.1109\/HST.2014.6855559"},{"key":"80_CR8","unstructured":"Pagliarini S, Mai K, Blanton S, Mitra S, Pileggi L (2018) Split-chip design for hardware security. IEEE Design and Test (under consideration)"},{"key":"80_CR9","unstructured":"Sweeney J, Zackriya M, Pagliarini S, Pileggi L (2019) Securing digital systems via Split-Chip Obfuscation. In: GOMACTech Technical Program"},{"issue":"8","key":"80_CR10","doi-asserted-by":"publisher","first-page":"1126","DOI":"10.1109\/JPROC.2014.2320516","volume":"102","author":"C Herder","year":"2014","unstructured":"Herder C, Yu M, Koushanfar F, Devadas S (2014) Physical unclonable functions and applications: a tutorial. Proc IEEE 102(8):1126\u20131141","journal-title":"Proc IEEE"},{"key":"80_CR11","doi-asserted-by":"crossref","unstructured":"Devadas S, Suh E, Paral S, Sowell R, Ziola T, Khandelwal V (2008) Design and implementation of PUF-based ``Unclonable\u201d RFID ICs for anti-counterfeiting and security applications. In: 2008 IEEE International Conference on RFID","DOI":"10.1109\/RFID.2008.4519377"},{"key":"80_CR12","unstructured":"Layman PA, Chaudhry S, Norman JG, Thomson RJ Electronic fingerprinting of semiconductor integrated circuits, Sep 2002. U.S. Patent 6738294"},{"key":"80_CR13","unstructured":"Su Y, Holleman J, Otis B (2007) A 1.6pJ\/bit 96% Stable chip-ID generating circuit using process variations. In: IEEE International Solid-State Circuits Conference, pp 406\u2013611"},{"key":"80_CR14","unstructured":"Holcomb DE, Burleson WP, Fu K (2007) Initial SRAM state as a fingerprint and source of true random numbers for RFID Tags. In: Conf. RFID Security, pp 11\u201313, Malaga, Spain"},{"key":"80_CR15","doi-asserted-by":"crossref","unstructured":"Maes R, et al. (2012) Experimental evaluation of physically unclonable functions in 65 nm CMOS. In: 2012 Proceedings of the ESSCIRC, pp 486\u2013489","DOI":"10.1109\/ESSCIRC.2012.6341361"},{"key":"80_CR16","first-page":"39","volume-title":"Information Security and Cryptography","author":"Helena Handschuh","year":"2010","unstructured":"Handschuh H, Schrijen G, Tuyls P (2010) Hardware intrinsic security from physically unclonable functions. In: Towards Hardware-Intrinsic Security: Foundations and Practice, pp 39\u201353"},{"key":"80_CR17","doi-asserted-by":"crossref","unstructured":"Diffie W, Hellman ME (1976) Multiuser cryptographic techniques. In: National Computer Conference and Exposition. ACM, New York, pp 109\u2013112","DOI":"10.1145\/1499799.1499815"},{"issue":"2","key":"80_CR18","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120\u2013126","journal-title":"Commun ACM"},{"key":"80_CR19","doi-asserted-by":"crossref","unstructured":"Guajardo J, Kumar SS, Schrijen G, Tuyls P (2007) FPGA Intrinsic PUFS and their use for IP protection. In: Cryptographic Hardware and Embedded Systems - CHES 2007, pp 63\u201380","DOI":"10.1007\/978-3-540-74735-2_5"},{"issue":"9","key":"80_CR20","doi-asserted-by":"publisher","first-page":"1198","DOI":"10.1109\/TC.2008.212","volume":"58","author":"DE Holcomb","year":"2009","unstructured":"Holcomb DE, Burleson WP, Fu K (2009) Power-Up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Trans Comput 58(9):1198\u20131210","journal-title":"IEEE Trans Comput"},{"key":"80_CR21","unstructured":"Specification for the Advanced Encryption Standard (AES) (2001) Federal Information Processing Standards Publication 197"},{"issue":"1","key":"80_CR22","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/0022-314X(80)90084-0","volume":"12","author":"MO Rabin","year":"1980","unstructured":"Rabin MO (1980) Probabilistic algorithm for testing primality. J Number 12(1):128\u2013138","journal-title":"J Number"},{"key":"80_CR23","unstructured":"Villar JC 512 bit RSA algorithm. https:\/\/opencores.org\/project\/rsa_512. Online; accessed August 2018"},{"key":"80_CR24","doi-asserted-by":"crossref","unstructured":"Bhuin S, et al. (2017) A self-calibrating sense amplifier for a true random number generator using hybrid finFET-straintronic MTJ. In IEEE\/ACM, Int. Symp. on Nanoscale Architectures (NANOARCH), pp 147\u2013152","DOI":"10.1109\/NANOARCH.2017.8053738"},{"key":"80_CR25","unstructured":"Karageorgos I (2019) Split-chip authentication. https:\/\/github.com\/ecelab-org\/Split-Chip_authentication"},{"issue":"9","key":"80_CR26","doi-asserted-by":"publisher","first-page":"1627","DOI":"10.1109\/TVLSI.2018.2828387","volume":"26","author":"SN Pagliarini","year":"2018","unstructured":"Pagliarini SN, Isgenc MM, Martins MGA, Pileggi L (2018) Application and Product-Volume-Specific customization of BEOL metal pitch. IEEE Trans Very Large Scale Integr (VLSI) Syst 26(9):1627\u20131636","journal-title":"IEEE Trans Very Large Scale Integr (VLSI) Syst"},{"issue":"2","key":"80_CR27","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s41635-018-0038-1","volume":"2","author":"B Yuce","year":"2018","unstructured":"Yuce B, Schaumont P, Witteman M (2018) Fault attacks on secure embedded software threats, design, and evaluation. J Hardw Syst Secur 2(2):111\u2013130","journal-title":"J Hardw Syst Secur"},{"key":"80_CR28","unstructured":"Conor Santifort Amber core. https:\/\/opencores.org\/project\/amber.Online; accessed August 2018"},{"key":"80_CR29","unstructured":"ARM Limited. GNU Embedded Toolchain For ARM https:\/\/developer.arm.com\/open-source\/gnu-toolchain\/gnu-rm.Online; accessed August 2018"},{"key":"80_CR30","unstructured":"Sharif MU, Shahid R, Gaj K, Rogawski M (2016) Hardware-software codesign of RSA for optimal performance vs. flexibility trade-off In Int. Conf. on Field Programmable Logic and Applications (FPL), pp 1\u20134"},{"key":"80_CR31","unstructured":"Aranha DF, Gouv\u00eaa CPL RELIC toolkit. https:\/\/github.com\/relic-toolkit\/relic"},{"key":"80_CR32","doi-asserted-by":"crossref","unstructured":"Lu C, dos Santos ALM, Pimentel FR (2002) Implementation of fast RSA key generation on smart cards in ACM symp. on applied computing, SAC \u201902, pp 214\u2013220","DOI":"10.1145\/508791.508837"},{"key":"80_CR33","unstructured":"Cheung RCC, Brown A, Luk W, Cheung PYK (Dec 2004) A scalable hardware architecture for prime number validation In IEEE Int. Conf. on Field-Programmable Technology, pp 177\u2013184"},{"key":"80_CR34","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/3-540-44499-8_27","volume-title":"Cryptographic Hardware and Embedded Systems \u2014 CHES 2000","author":"Marc Joye","year":"2000","unstructured":"Joye M, Paillier P, Vaudenay S (2000) Efficient generation of prime numbers. In: Cryptographic Hardware and Embedded Systems \u2014 CHES 2000, pp 340\u2013354"},{"key":"80_CR35","doi-asserted-by":"crossref","unstructured":"Bahadori M, et al. (2010) A novel approach for secure and fast generation of RSA public and private keys on SmartCard. In: IEEE Int. NEWCAS Conference, pp 265\u2013268","DOI":"10.1109\/NEWCAS.2010.5603937"}],"container-title":["Journal of Hardware and Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-019-00080-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41635-019-00080-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-019-00080-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T01:01:07Z","timestamp":1606266067000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s41635-019-00080-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,26]]},"references-count":35,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["80"],"URL":"https:\/\/doi.org\/10.1007\/s41635-019-00080-y","relation":{},"ISSN":["2509-3428","2509-3436"],"issn-type":[{"type":"print","value":"2509-3428"},{"type":"electronic","value":"2509-3436"}],"subject":[],"published":{"date-parts":[[2019,11,26]]},"assertion":[{"value":"17 January 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 September 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 November 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}