scispace - formally typeset
Proceedings ArticleDOI

Physical unclonable functions for device authentication and secret key generation

TLDR
This work presents PUF designs that exploit inherent delay characteristics of wires and transistors that differ from chip to chip, and describes how PUFs can enable low-cost authentication of individual ICs and generate volatile secret keys for cryptographic operations.
Abstract
Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets from physical characteristics of integrated circuits (ICs). We present PUF designs that exploit inherent delay characteristics of wires and transistors that differ from chip to chip, and describe how PUFs can enable low-cost authentication of individual ICs and generate volatile secret keys for cryptographic operations.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

A Flip-Flop Based Arbiter Physical Unclonable Function (APUF) Design with High Entropy and Uniqueness for FPGA Implementation

TL;DR: Initial tests show that to attack the proposed FF-APUF design requires more effort for the adversary than a conventional APUF design, and the empirical min-entropy of the FF-apUF design across different devices is shown to be more than twice that of the conventional APF design.
Book ChapterDOI

A novel RFID distance bounding protocol based on physically unclonable functions

TL;DR: In this paper, a strong adversary model for Physically Unclonable Functions (PUF) based authentication protocol in which the adversary has access to volatile memory of the tag was introduced.
Proceedings ArticleDOI

A Robust SRAM-PUF Key Generation Scheme Based on Polar Codes

TL;DR: This work proposes a practical error correction construction for PUF-based secret generation that are based on polar codes, and proposes an adaptive list decoder for polar codes that makes use of the hash that is already available at the decoder.
Book ChapterDOI

SIMPL systems, or: can we design cryptographic hardware without secret key information?

TL;DR: No secret information is, or needs to be, contained in SIMPL systems in order to enable cryptographic protocols -- neither in the form of a standard binary key, nor as secret information hidden in random, analog features, as it is the case for PUFs.
Journal ArticleDOI

T2FA: Transparent Two-Factor Authentication

TL;DR: A transparent two-factor authentication (T2FA) based on physical unclonable function (PUF) and voiceprint that avoids the tedious interaction and provides the same high user experience satisfaction as the single-Factor authentication and exhibits high security simultaneously.
References
More filters
Journal ArticleDOI

Physical one-way functions

TL;DR: The concept of fabrication complexity is introduced as a way of quantifying the difficulty of materially cloning physical systems with arbitrary internal states as primitives for physical analogs of cryptosystems.
Proceedings ArticleDOI

Silicon physical random functions

TL;DR: It is argued that a complex integrated circuit can be viewed as a silicon PUF and a technique to identify and authenticate individual integrated circuits (ICs) is described.

Tamper resistance: a cautionary note

TL;DR: It is concluded that trusting tamper resistance is problematic; smartcards are broken routinely, and even a device that was described by a government signals agency as 'the most secure processor generally available' turns out to be vulnerable.
Journal ArticleDOI

Extracting secret keys from integrated circuits

TL;DR: It is shown that arbiter-based PUFs are realizable and well suited to build key-cards that need to be resistant to physical attacks and to be identified securely and reliably over a practical range of environmental variations such as temperature and power supply voltage.
Journal ArticleDOI

Impact of die-to-die and within-die parameter fluctuations on the maximum clock frequency distribution for gigascale integration

TL;DR: In this paper, a model describing the maximum clock frequency distribution of a microprocessor is derived and compared with wafer sort data for a recent 0.25-/spl mu/m microprocessor.
Related Papers (5)