scispace - formally typeset
Proceedings ArticleDOI

Physical unclonable functions for device authentication and secret key generation

TLDR
This work presents PUF designs that exploit inherent delay characteristics of wires and transistors that differ from chip to chip, and describes how PUFs can enable low-cost authentication of individual ICs and generate volatile secret keys for cryptographic operations.
Abstract
Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets from physical characteristics of integrated circuits (ICs). We present PUF designs that exploit inherent delay characteristics of wires and transistors that differ from chip to chip, and describe how PUFs can enable low-cost authentication of individual ICs and generate volatile secret keys for cryptographic operations.

read more

Content maybe subject to copyright    Report

Citations
More filters
Posted Content

Interpose PUF can be PAC Learned.

TL;DR: This work shows that Interpose PUF can be approximated by a Linear Threshold Function (LTF), assuming the interpose bit to be random and proves that the resultant LTF can be learned with number of labelled examples (challenge response pairs) polynomial in the number of stages and PAC model parameters.
Proceedings ArticleDOI

Feed-Forward XOR PUFs: Reliability and Attack-Resistance Analysis

TL;DR: This paper proposes design of feed-forward XORPUFs (FFXOR PUFs) where each component PUF is a feed- forward arbiter PUF (FF PUF) and shows that the use of a thresholding strategy can increase the reliability of FFXor PUFs by about 30% for a 15% noise level.
Proceedings ArticleDOI

Lemonade from Lemons: Harnessing Device Wearout to Create Limited-Use Security Architectures

TL;DR: This work introduces techniques for architecturally controlling these bounds and performs a design space exploration for three use cases: a limited-use connection, alimited-use targeting system and one-time pads, which includes decision trees, parallel structures, Shamir's secret-sharing mechanism, Reed-Solomon codes, and module replication.
Posted Content

Ring Oscillator and its application as Physical Unclonable Function (PUF) for Password Management

TL;DR: Physical unclonable function (PUF) is utilizing PUF to store the challenge of each user instead of saving the hash of passwords in Password manager systems.
Journal ArticleDOI

PUF Architecture with Run-Time Adaptation for Resilient and Energy-Efficient Key Generation via Sensor Fusion

TL;DR: A novel PUF-based key generation architecture featuring run-time instability monitoring and adaptive error correction, overcoming the limitations of conventional architectures with fixed correction bits set at design or testing time is presented.
References
More filters
Journal ArticleDOI

Physical one-way functions

TL;DR: The concept of fabrication complexity is introduced as a way of quantifying the difficulty of materially cloning physical systems with arbitrary internal states as primitives for physical analogs of cryptosystems.
Proceedings ArticleDOI

Silicon physical random functions

TL;DR: It is argued that a complex integrated circuit can be viewed as a silicon PUF and a technique to identify and authenticate individual integrated circuits (ICs) is described.

Tamper resistance: a cautionary note

TL;DR: It is concluded that trusting tamper resistance is problematic; smartcards are broken routinely, and even a device that was described by a government signals agency as 'the most secure processor generally available' turns out to be vulnerable.
Journal ArticleDOI

Extracting secret keys from integrated circuits

TL;DR: It is shown that arbiter-based PUFs are realizable and well suited to build key-cards that need to be resistant to physical attacks and to be identified securely and reliably over a practical range of environmental variations such as temperature and power supply voltage.
Journal ArticleDOI

Impact of die-to-die and within-die parameter fluctuations on the maximum clock frequency distribution for gigascale integration

TL;DR: In this paper, a model describing the maximum clock frequency distribution of a microprocessor is derived and compared with wafer sort data for a recent 0.25-/spl mu/m microprocessor.
Related Papers (5)