Proceedings ArticleDOI
Physical unclonable functions for device authentication and secret key generation
G. Edward Suh,Srinivas Devadas +1 more
- pp 9-14
TLDR
This work presents PUF designs that exploit inherent delay characteristics of wires and transistors that differ from chip to chip, and describes how PUFs can enable low-cost authentication of individual ICs and generate volatile secret keys for cryptographic operations.Abstract:
Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets from physical characteristics of integrated circuits (ICs). We present PUF designs that exploit inherent delay characteristics of wires and transistors that differ from chip to chip, and describe how PUFs can enable low-cost authentication of individual ICs and generate volatile secret keys for cryptographic operations.read more
Citations
More filters
Proceedings ArticleDOI
The Impact of Aging on an FPGA-Based Physical Unclonable Function
TL;DR: This work performs an accelerated aging testing on an FPGA-based ring oscillator PUF (RO-PUF) and analyzes how it affects the functionality of the PUF to observe that aging makes PUF responses unreliable; on the other hand, the randomness ofPUF responses remains unaffected despite aging.
Book ChapterDOI
PUFKY: a fully functional PUF-based cryptographic key generator
TL;DR: The presented PUFKY core is able to produce a cryptographically secure 128-bit key with a failure rate <10−9 in 5.62ms and the design's modularity allows for rapid and scalable adaptations for other PUF implementations or for alternative key requirements.
Journal ArticleDOI
A Secure IoT-Based Modern Healthcare System With Fault-Tolerant Decision Making Process
TL;DR: This paper proposes an enhanced system by introducing a Physical Unclonable Function (PUF)-based authentication scheme and a data driven fault-tolerant decision-making scheme for designing an IoT-based modern healthcare system that is more secure and efficient than existing systems.
Journal ArticleDOI
A Case of Lightweight PUF Constructions: Cryptanalysis and Machine Learning Attacks
TL;DR: This paper develops two different mathematical attacks on previously proposed lightweight PUF circuits, namely composite PUF and the multibit output lightweight secure PUF (LSPUF), and elucidate a special property of the output network of LSPUF to show how it can be leveraged by an adversary to perform an intelligent model building attack.
References
More filters
Journal ArticleDOI
Physical one-way functions
TL;DR: The concept of fabrication complexity is introduced as a way of quantifying the difficulty of materially cloning physical systems with arbitrary internal states as primitives for physical analogs of cryptosystems.
Proceedings ArticleDOI
Silicon physical random functions
TL;DR: It is argued that a complex integrated circuit can be viewed as a silicon PUF and a technique to identify and authenticate individual integrated circuits (ICs) is described.
Tamper resistance: a cautionary note
Ross Anderson,Markus G. Kuhn +1 more
TL;DR: It is concluded that trusting tamper resistance is problematic; smartcards are broken routinely, and even a device that was described by a government signals agency as 'the most secure processor generally available' turns out to be vulnerable.
Journal ArticleDOI
Extracting secret keys from integrated circuits
TL;DR: It is shown that arbiter-based PUFs are realizable and well suited to build key-cards that need to be resistant to physical attacks and to be identified securely and reliably over a practical range of environmental variations such as temperature and power supply voltage.
Journal ArticleDOI
Impact of die-to-die and within-die parameter fluctuations on the maximum clock frequency distribution for gigascale integration
TL;DR: In this paper, a model describing the maximum clock frequency distribution of a microprocessor is derived and compared with wafer sort data for a recent 0.25-/spl mu/m microprocessor.