Proceedings ArticleDOI
Physical unclonable functions for device authentication and secret key generation
G. Edward Suh,Srinivas Devadas +1 more
- pp 9-14
TLDR
This work presents PUF designs that exploit inherent delay characteristics of wires and transistors that differ from chip to chip, and describes how PUFs can enable low-cost authentication of individual ICs and generate volatile secret keys for cryptographic operations.Abstract:
Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets from physical characteristics of integrated circuits (ICs). We present PUF designs that exploit inherent delay characteristics of wires and transistors that differ from chip to chip, and describe how PUFs can enable low-cost authentication of individual ICs and generate volatile secret keys for cryptographic operations.read more
Citations
More filters
Proceedings ArticleDOI
A zero-overhead IC identification technique using clock sweeping and path delay analysis
TL;DR: There is no overhead in terms of area, timing, or power for this method, since it extracts the intrinsic path delay variation information of the IC through path delay analysis.
Proceedings ArticleDOI
A Novel Aging Tolerant RO-PUF for Low Power Application
TL;DR: A modified aging tolerant architecture for ring oscillator based PUF (RO-PUF) in which the conventional CMOS based ROs are replaced by modified RO, which shows high tolerance to aging as compared to existing RO.
Patent
Apparatus, system and method for providing cryptographic key information with physically unclonable function circuitry
TL;DR: In this paper, a cryptographic engine receives a value from PUF circuitry and based on the value, outputs a result of a cryptographic operation to a bus of a security module, which couples the cryptographic engine to control logic or interface logic of the security module.
Patent
Cryptographic key generation using a stored input value and a stored count value
TL;DR: In this paper, the authors describe a processor that includes non-volatile storage storing an input value and a count value, and logic to generate a cryptographic key based on the stored input values and the stored count values.
Proceedings ArticleDOI
Digital Right Management for IP Protection
Jerome Rampon,Renaud Perillat,Lionel Torres,Pascal Benoit,Giorgio Di Natale,Mario Barbareschi +5 more
TL;DR: A new approach based on a original way to extract Physically Unclonable Function which is at the heart of the DRM proposal is proposed.
References
More filters
Journal ArticleDOI
Physical one-way functions
TL;DR: The concept of fabrication complexity is introduced as a way of quantifying the difficulty of materially cloning physical systems with arbitrary internal states as primitives for physical analogs of cryptosystems.
Proceedings ArticleDOI
Silicon physical random functions
TL;DR: It is argued that a complex integrated circuit can be viewed as a silicon PUF and a technique to identify and authenticate individual integrated circuits (ICs) is described.
Tamper resistance: a cautionary note
Ross Anderson,Markus G. Kuhn +1 more
TL;DR: It is concluded that trusting tamper resistance is problematic; smartcards are broken routinely, and even a device that was described by a government signals agency as 'the most secure processor generally available' turns out to be vulnerable.
Journal ArticleDOI
Extracting secret keys from integrated circuits
TL;DR: It is shown that arbiter-based PUFs are realizable and well suited to build key-cards that need to be resistant to physical attacks and to be identified securely and reliably over a practical range of environmental variations such as temperature and power supply voltage.
Journal ArticleDOI
Impact of die-to-die and within-die parameter fluctuations on the maximum clock frequency distribution for gigascale integration
TL;DR: In this paper, a model describing the maximum clock frequency distribution of a microprocessor is derived and compared with wafer sort data for a recent 0.25-/spl mu/m microprocessor.