scispace - formally typeset
Open AccessJournal ArticleDOI

Physical Unclonable Functions and Applications: A Tutorial

Reads0
Chats0
TLDR
This paper motivates the use of PUFs versus conventional secure nonvolatile memories, defines the two primary PUF types, and describes strong and weak PUF implementations and their use for low-cost authentication and key generation applications.
Abstract
This paper describes the use of physical unclonable functions (PUFs) in low-cost authentication and key generation applications. First, it motivates the use of PUFs versus conventional secure nonvolatile memories and defines the two primary PUF types: “strong PUFs” and “weak PUFs.” It describes strong PUF implementations and their use for low-cost authentication. After this description, the paper covers both attacks and protocols to address errors. Next, the paper covers weak PUF implementations and their use in key generation applications. It covers error-correction schemes such as pattern matching and index-based coding. Finally, this paper reviews several emerging concepts in PUF technologies such as public model PUFs and new PUF implementation technologies.

read more

Citations
More filters
Journal ArticleDOI

In-memory computing with resistive switching devices

TL;DR: This Review Article examines the development of in-memory computing using resistive switching devices, where the two-terminal structure of the devices, theirresistive switching properties, and direct data processing in the memory can enable area- and energy-efficient computation.
Journal ArticleDOI

A review of emerging non-volatile memory (NVM) technologies and applications

An Chen
TL;DR: High-performance and low-cost emerging NVMs may simplify memory hierarchy, introduce non-volatility in logic gates and circuits, reduce system power, and enable novel architectures, and Storage-class memory (SCM) based on high-density NVMs could fill the performance and density gap between memory and storage.
Journal ArticleDOI

IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices

TL;DR: A reasoned comparison of the considered IoT technologies with respect to a set of qualifying security attributes, namely integrity, anonymity, confidentiality, privacy, access control, authentication, authorization, resilience, self organization is concluded.
Journal ArticleDOI

Physical unclonable functions generated through chemical methods for anti-counterfeiting

TL;DR: Stochastic chemical processes can afford unique anti-counterfeiting tags that cannot be reproduced, which forms PUF keys that provide unbreakable encryption and combat counterfeiting.
Journal ArticleDOI

Inkjet-printed unclonable quantum dot fluorescent anti-counterfeiting labels with artificial intelligence authentication.

TL;DR: A non-destructive, inkjet-printable, artificial intelligence (AI)-decodable and unclonable security label based on random patterning of quantum dot inks is developed, and accompanied with an artificial intelligence decoding mechanism capable of authenticating the patterns.
References
More filters
Proceedings ArticleDOI

Physical unclonable functions for device authentication and secret key generation

TL;DR: This work presents PUF designs that exploit inherent delay characteristics of wires and transistors that differ from chip to chip, and describes how PUFs can enable low-cost authentication of individual ICs and generate volatile secret keys for cryptographic operations.
Book ChapterDOI

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

TL;DR: This work provides formal definitions and efficient secure techniques for turning biometric information into keys usable for any cryptographic application, and reliably and securely authenticating biometric data.
Journal ArticleDOI

Physical one-way functions

TL;DR: The concept of fabrication complexity is introduced as a way of quantifying the difficulty of materially cloning physical systems with arbitrary internal states as primitives for physical analogs of cryptosystems.
Proceedings ArticleDOI

Silicon physical random functions

TL;DR: It is argued that a complex integrated circuit can be viewed as a silicon PUF and a technique to identify and authenticate individual integrated circuits (ICs) is described.
Related Papers (5)