{"id":1142,"date":"2020-12-16T10:46:50","date_gmt":"2020-12-16T10:46:50","guid":{"rendered":"https:\/\/blog.pufsecurity.com\/?p=1142"},"modified":"2022-04-06T04:03:05","modified_gmt":"2022-04-06T04:03:05","slug":"pufcc-%e4%ba%a7%e5%93%81%e7%89%b9%e5%86%99","status":"publish","type":"dlp_document","link":"https:\/\/www.pufsecurity.com\/zh-hant\/document\/pufcc-%e4%ba%a7%e5%93%81%e7%89%b9%e5%86%99\/","title":{"rendered":"\u5b89\u5168\u52a0\u5bc6\u5354\u5904\u7406\u5668: PUFcc"},"content":{"rendered":"\n

\u3000\u3000\u5728\u8d44\u8baf\u5b89\u5168\u666e\u904d\u88ab\u8ba4\u540c\u9700\u8981\u91cd\u89c6\u3001\u4e88\u4ee5\u4fdd\u62a4\u7684\u4e92\u8054\u4e16\u754c\u4e2d\uff0cIoT\u8bbe\u5907\u4e0e\u670d\u52a1\u5668\u95f4\u7684\u63e1\u624b\u534f\u8bae\u5219\u987b\u4ef0\u8d56\u4ee5\u975e\u5bf9\u79f0\u5f0f\u7b97\u6cd5\u4e3a\u4e3b\u7684\u516c\u94a5\u52a0\u901fPKC\u7b97\u6cd5(Public Key cryptography)\uff0c\u65b9\u80fd\u5b9e\u73b0\u5b89\u5168\u8fde\u7ebf\u7684\u5efa\u7acb\uff0c\u5e76\u56e0\u5e94\u4e92\u8054\u5e94\u7528\u7684\u76f8\u5173\u786c\u4ef6\u5bc6\u94a5\u66f4\u65b0\u4e0e\u7ebf\u4e0a\u56fa\u4ef6\u66f4\u65b0\u4fdd\u62a4\u3002\u5728\u8bbe\u5907\u6216\u670d\u52a1\u5668\u7684\u7cfb\u7edf\u6267\u884c\u5f00\u673a\u7a0b\u5e8f\u3001\u542f\u52a8\u5b89\u5168\u68c0\u67e5\u65f6(secure boot)\uff0c\u4ea6\u9700\u4ef0\u8d56\u76f8\u5173\u7684\u5bf9\u79f0\u5f0f\u7b97\u6cd5(\u6bd4\u65b9AES) \u4e0e\u6742\u51d1\u6458\u8981(\u6bd4\u65b9Hash)\u7b97\u6cd5\u65b9\u80fd\u5b9e\u73b0\u3002\u56e0\u6b64\uff0c\u82af\u7247\u5b89\u5168\u89e3\u51b3\u65b9\u6848\u4e0d\u4ec5\u4ec5\u6b62\u4e8e\u4fe1\u606f\u5b89\u5168\u5b58\u50a8\uff0c\u8fd8\u5305\u62ec\u5b89\u5168\u7a0b\u5e8f\u8fd0\u884c\u4e0e\u5b89\u5168\u8fb9\u754c\u7684\u5efa\u7acb\uff0c\u7f3a\u4e00\u4e0d\u53ef\u3002<\/p>\n\n\n\n

\u3000\u3000PUFcc\u662f\u4e13\u95e8\u4e3aIoT\u5e94\u7528\u800c\u521b\u5efa\u7684\u89e3\u51b3\u65b9\u6848\u3002\u5176\u65e8\u5728\u652f\u6301\u5b89\u5168\u8fde\u7ebf\u7684\u5efa\u7acb\u3001\u7cfb\u7edf\u542f\u52a8\u4ee3\u7801\u7684\u5b89\u5168\u5f00\u673a\u3001\u4e0e\u5b89\u5168\u7ebf\u4e0a\u56fa\u4ef6\u66f4\u65b0\u3002PUFcc\u7531\u786c\u4ef6\u4fe1\u4efb\u6839\uff08PUFrt\uff09\u4e0e\u5b8c\u6574\u7684\u52a0\u89e3\u5bc6\u5f15\u64ce\u6240\u7ec4\u6210\uff0c\u4ee5\u9002\u914d\u5404\u79cd\u4e0d\u540c\u5e94\u7528\u6240\u9700\u7684\u52a0\u89e3\u5bc6\u7b97\u6cd5\u652f\u6301\u3002\u9664\u4e86\u4fe1\u606f\u5b89\u5168\u7684\u673a\u5bc6\u6027\u3001\u5b8c\u6574\u6027\u3001\u771f\u5b9e\u6027\u548c\u968f\u673a\u6027\u7b49\u57fa\u7840\u5b89\u5168\u9700\u6c42\uff0c\u66f4\u80fd\u62c5\u4efb\u7cfb\u7edf\u7684\u5b89\u5168\u9886\u822a\u5458\u4e3a\u542f\u52a8\u7a0b\u5e8f\u52a0\u8f7d\u4e0e\u5b89\u5168\u7ebf\u4e0a\u56fa\u4ef6\u5347\u7ea7\u7b49\u8f83\u8fdb\u9636\u7684\u529f\u80fd\u63d0\u4f9b\u786c\u4ef6\u52a0\u901f\uff0c\u5e76\u5b8c\u7f8e\u652f\u6301\u5404\u79cd\u82af\u7247\u7ea7\u5fae\u5904\u7406\u5668(\u6bd4\u5982ARM \/ RISC-V)\uff0c\u662f\u6027\u50f9\u6bd4\u76f8\u7576\u9ad8\u7684\u5b89\u5168\u534f\u5904\u7406\u5668\u3002<\/p>\n\n\n\n

\u3000\u3000\u8fdb\u4e00\u6b65\u5256\u6790PUFcc\uff0c\u5176\u63d0\u4f9b\u4e86\u5b89\u5168\u5b58\u50a8\u3001\u5bc6\u94a5\u7ba1\u7406\u4e0e\u8d1f\u8d23\u52a0\u89e3\u5bc6\u7b97\u6cd5\u6a21\u5757\uff0c\u4f8b\u5982SHA-2\u5b8c\u6574\u6027\u68c0\u67e5\uff0cAES\u5757\u5bc6\u7801\u548cPKC\u7684\u539f\u59cb\u529f\u80fd\uff0c\u4ee5\u534f\u52a9\u7cfb\u7edf\u8fdb\u884c\u6570\u5b57\u7b7e\u540d\u548c\u5bc6\u94a5\u7ba1\u7406\u3002\u9488\u5bf9\u5bc6\u94a5\u7ba1\u7406\uff0cPUFiot\u8fd8\u63d0\u4f9b\u4e86\u57fa\u4e8eNIST\u53d1\u5e03\u7684\u6807\u51c6\u5bc6\u94a5\u5305\u88c5(KWP)\u548c\u5bc6\u94a5\u6d3e\u751f(KDF)\u529f\u80fd\uff0c\u4e13\u95e8\u7528\u4e8e\u5bc6\u94a5\u7684\u5b89\u5168\u5f15\u7528\u4e0e\u5b89\u5168\u5bfc\u51fa\uff0c\u589e\u52a0\u5bc6\u94a5\u7684\u5b89\u5168\u6027\u4e0e\u51cf\u5c11\u5bc6\u94a5\u66b4\u9732\u4e8e\u7cfb\u7edf\u603b\u7ebf\u4e0a\u7684\u8106\u5f31\u6027\u3002<\/p>\n\n\n\n

\u3000\u3000\u901a\u8fc7\u5b8c\u6574\u7075\u6d3b\u7684\u7b97\u6cd5\u6a21\u5757\u5316\u8bbe\u8ba1\uff0c\u53ef\u4ee5\u6839\u636e\u6bcf\u4e2a\u7528\u6237\u7684\u7279\u5b9a\u5ba2\u5236PUFcc\u7684\u52a0\u89e3\u5bc6\u7b97\u6cd5\u6a21\u5757\u3002\u4f8b\u5982\uff0c\u4f7f\u7528SM4\u66ff\u6362AES\u4f5c\u4e3a\u5206\u7ec4\u5bc6\u7801\u7684\u9009\u62e9\uff0c\u4f7f\u5176\u4ff1\u5907\u9ad8\u9002\u914d\u6027\u7684\u4e92\u8054\u7f51\u5b89\u5168\u5e94\u7528\u3002<\/p>\n\n\n\n

\u3000\u3000\u4e0d\u4ec5\u5982\u6b64\uff0c\u4e3a\u4e86\u964d\u4f4e\u7684\u82af\u7247\u5728\u7cfb\u7edf\u5c42\u7ea7\u7684\u590d\u6742\u5ea6\uff0cPUFiot\u00ae\u652f\u6301APB\u6807\u51c6\u534f\u8bae\u63a5\u53e3\uff0c\u7528\u4e8ePUFcc\u5bc4\u5b58\u5668\u547d\u4ee4\u5904\u7406\uff1b \u81f3\u4e8e\u9ad8\u901f\u5185\u7f6eDMA\u6a21\u5757\u7684\u63a5\u53e3\uff0c\u5219\u91c7\u7528AXI4\u63a5\u53e3\uff0c\u53ef\u5feb\u901f\u8bbf\u95ee\u4e8e\u50a8\u5b58\u4e8e\u7cfb\u7edf\u5185\u5b58\u4e2d\u7684\u8f83\u5927\u91cf\u6570\u636e\u3002<\/p>\n\n\n\n

\u3000\u3000\u9664\u786c\u4ef6IP\u5916\uff0cPUFcc\u8fd8\u63d0\u4f9b\u6807\u51c6\u7684\u8f6f\u4ef6\u5185\u5bb9\uff0c\u5305\u62ecLinux bare-metal firmware\u548chigh-level API\uff0c\u4ee5\u7f29\u77ed\u8f6f\u4ef6\u5f00\u53d1\u90e8\u7f72\u65f6\u7a0b\u3002<\/p>\n\n\n\n

<\/p>\n\n\n\n

\u3000\u3000\u603b\u7ed3\u800c\u8a00\uff0cPUFcc\u662f\u4e00\u79cd\u4ee5PUF\u4e3a\u5b89\u5168\u57fa\u5e95\u7684\u9ad8\u5b89\u5168\u6027\u52a0\u89e3\u5bc6\u534f\u4f5c\u5904\u7406\u5668\u3002\u4e0e\u4f20\u7edf\u7684SoC\u5b89\u5168\u8bbe\u8ba1\uff08\u5177\u6709\u5b89\u5168\u6838\u5fc3\u6216\u5206\u7acb\u52a0\u5bc6\u7ec4\u4ef6\u7684\u5d4c\u5165\u5f0fHSM\uff09\u76f8\u6bd4\uff0cPUFcc\u9664\u4e86\u63d0\u4f9b\u6709\u6548\u7684\u7b97\u6cd5\u6267\u884c\u529f\u80fd\u4e4b\u5916\uff0c\u66f4\u91c7\u7528\u786c\u4ef6\u4fe1\u4efb\u6839PUFrt\uff0c\u76f4\u63a5\u63d0\u9ad8\u4f7f\u7528\u5176\u7cfb\u7edf\u7684\u5b89\u5168\u5b58\u50a8\u529f\u80fd\uff0c\u66f4\u65e0\u9700\u5728\u5904\u7406\u5668\u6838\u5fc3\u6216\u64cd\u4f5c\u7cfb\u7edf\u4e0a\u589e\u52a0\u989d\u5916\u8d1f\u62c5\u3002<\/p>\n\n\n\n

\u3000\u3000\u900f\u8fc7\u4e5d\u5927\u529f\u80fd\u6a21\u5757\u7684\u534f\u8c03\u8fd0\u4f5c\uff08\u8868\u4e00\uff09\uff0c\u5bc6\u94a5\u7ba1\u7406\u548c\u654f\u611f\u4fe1\u606f\u7ec8\u5c06\u53d7\u5230\u826f\u597d\u4fdd\u62a4\uff1bPUFcc\u5185\u90e8\u7684\u5bc6\u94a5\u5b9a\u4e49\u660e\u786e\uff0c\u5e76\u63d0\u4f9b\u5b8c\u6574\u7684\u5b89\u5168\u8fb9\u754c\uff0c\u65e0\u9700\u62c5\u5fc3\u5bc6\u94a5\u66dd\u9732\u7684\u98ce\u9669\u3002\u57fa\u4e8e\u5b89\u5168\u8003\u8651\uff0cPUFcc\u4e5f\u652f\u6301\u5bc6\u94a5\u9500\u6bc1(\u5168\u96f6\u5316)\u529f\u80fd\uff0c\u53ef\u505a\u4e3a\u7cfb\u7edf\u6700\u540e\u786e\u4fdd\u5b89\u5168\u7684\u540e\u76fe\u3002<\/p>\n\n\n\n

\u3000\u3000PUFcc\u662f\u57fa\u4e8e\u786c\u4ef6\u7684\u7269\u7406\u9694\u79bb\u6240\u8bbe\u8ba1\uff0c\u63d0\u4f9b\u4e86\u53ef\u9760\u7684\u5b89\u5168\u8fb9\u754c\uff0c\u4f7f\u5176\u5f3a\u5316\u6709\u522b\u4e8e\u7eaf\u8f6f\u4f53\u5b89\u5168\u8bbe\u8ba1\u7684\u5f31\u70b9\u3002PUF\u662f\u5929\u751f\u81ea\u5e26\u4fdd\u62a4\u80fd\u529b\u7684\u9759\u6001\u71b5\u6e90\uff0c\u9002\u5408SoC\u67b6\u6784\u5e08\u4f7f\u7528\u5bc6\u94a5\u751f\u6210\u548c\u7ba1\u7406\u7a0b\u5e8f\u6765\u6784\u5efa\u7cfb\u7edf\u7684\u5bc6\u94a5\u5c42\u6b21\u7ed3\u6784\u3002<\/p>\n\n\n\n

\"\"
\u8868\u4e00. PUFcc \u529f\u80fd\u6a21\u5757\u8bf4\u660e<\/figcaption><\/figure><\/div>\n","protected":false},"excerpt":{"rendered":"

\u3000\u3000\u5728\u8d44\u8baf\u5b89\u5168\u666e\u904d\u88ab\u8ba4\u540c\u9700\u8981\u91cd\u89c6\u3001\u4e88\u4ee5\u4fdd\u62a4\u7684\u4e92\u8054\u4e16\u754c\u4e2d\uff0cIoT\u8bbe\u5907\u4e0e\u670d\u52a1\u5668\u95f4\u7684\u63e1\u624b\u534f\u8bae\u5219\u987b\u4ef0\u8d56\u4ee5\u975e\u5bf9\u79f0\u5f0f\u7b97\u6cd5\u4e3a […]<\/p>\n","protected":false},"author":3,"featured_media":1873,"template":"","doc_tags":[201,204,203,200],"class_list":["post-1142","dlp_document","type-dlp_document","status-publish","has-post-thumbnail","hentry","doc_categories-article","doc_tags-crypto-coprocessor","doc_tags-hardware-security","doc_tags-puf","doc_tags-root-of-trust"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/dlp_document\/1142"}],"collection":[{"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/dlp_document"}],"about":[{"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/types\/dlp_document"}],"author":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/users\/3"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/media\/1873"}],"wp:attachment":[{"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/media?parent=1142"}],"wp:term":[{"taxonomy":"doc_tags","embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/doc_tags?post=1142"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}