Proceedings ArticleDOI
Physical unclonable functions for device authentication and secret key generation
G. Edward Suh,Srinivas Devadas +1 more
- pp 9-14
TLDR
This work presents PUF designs that exploit inherent delay characteristics of wires and transistors that differ from chip to chip, and describes how PUFs can enable low-cost authentication of individual ICs and generate volatile secret keys for cryptographic operations.Abstract:
Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets from physical characteristics of integrated circuits (ICs). We present PUF designs that exploit inherent delay characteristics of wires and transistors that differ from chip to chip, and describe how PUFs can enable low-cost authentication of individual ICs and generate volatile secret keys for cryptographic operations.read more
Citations
More filters
Journal ArticleDOI
Optimizating Emerging Nonvolatile Memories for Dual-Mode Applications: Data Storage and Key Generator
TL;DR: A new memory-based PUF that exploits the nonvolatility and random variability of emerging memory technologies to produce random bits and a general method to find the optimal design point of emerging nonvolatile memory (eNVM)-based PUFs is proposed.
Proceedings ArticleDOI
Model building attacks on Physically Unclonable Functions using genetic programming
TL;DR: This work has demonstrated the feasibility of a computationally simple scheme to model FPGA-based PUFs, and it is believed this work will pave the way for similar attempts to attack more sophisticated PUF implementations.
Journal ArticleDOI
Improved ring oscillator PUF on FPGA and its properties
TL;DR: This work provides a more detailed description of the PUF design on FPGA and the behaviour of ROs with varying supply voltage and offers more output bits with required statistical properties from each RO pair than the classical approach.
Book ChapterDOI
Practical security analysis of PUF-based two-player protocols
Ulrich Rührmair,Marten van Dijk +1 more
TL;DR: This paper presents an attack on two recent OT- and BC-protocols which have been introduced at CRYPTO 2011, discusses countermeasures against the attack, and shows that interactive hashing is suited to enhance the security of PUF-based OT and BC, albeit at the price of an increased round complexity.
Journal ArticleDOI
Blockchain in IoT: Current Trends, Challenges, and Future Roadmap
TL;DR: This paper presents various challenges facing an IoT system and summarizes the benefits of adopting blockchain into IoT infrastructure, and focuses on illustrating the blockchain applications in IoT with refined capabilities and enhanced security.
References
More filters
Journal ArticleDOI
Physical one-way functions
TL;DR: The concept of fabrication complexity is introduced as a way of quantifying the difficulty of materially cloning physical systems with arbitrary internal states as primitives for physical analogs of cryptosystems.
Proceedings ArticleDOI
Silicon physical random functions
TL;DR: It is argued that a complex integrated circuit can be viewed as a silicon PUF and a technique to identify and authenticate individual integrated circuits (ICs) is described.
Tamper resistance: a cautionary note
Ross Anderson,Markus G. Kuhn +1 more
TL;DR: It is concluded that trusting tamper resistance is problematic; smartcards are broken routinely, and even a device that was described by a government signals agency as 'the most secure processor generally available' turns out to be vulnerable.
Journal ArticleDOI
Extracting secret keys from integrated circuits
TL;DR: It is shown that arbiter-based PUFs are realizable and well suited to build key-cards that need to be resistant to physical attacks and to be identified securely and reliably over a practical range of environmental variations such as temperature and power supply voltage.
Journal ArticleDOI
Impact of die-to-die and within-die parameter fluctuations on the maximum clock frequency distribution for gigascale integration
TL;DR: In this paper, a model describing the maximum clock frequency distribution of a microprocessor is derived and compared with wafer sort data for a recent 0.25-/spl mu/m microprocessor.