Skip to main content

2010 | OriginalPaper | Buchkapitel

Hardware Intrinsic Security from Physically Unclonable Functions

verfasst von : Helena Handschuh, Geert-Jan Schrijen, Pim Tuyls

Erschienen in: Towards Hardware-Intrinsic Security

Verlag: Springer Berlin Heidelberg

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Counterfeiting of goods in general and of electronic goods in particular is a growing concern with a huge impact on the global economy, the society, and the security of its critical infrastructure. Various examples are known where companies suffer from economic and brand damage due to competition with counterfeit goods. In some cases the use of counterfeit components has even led to tragic accidents in which lives were lost. It has also recently become clear that counterfeit products can penetrate the critical and security infrastructure of our modern societies and hence cause a threat to national security.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Note that in systems where the external memory is encrypted, there still needs to be an on-chip key to decrypt the data from the memory as it is being read or written.
 
Literatur
1.
Zurück zum Zitat F. Armknecht, R. Maes, A.R. Sadeghi, B. Sunar, P. Tuyls, in Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions. Proceedings of ASIACRYPT 2009. Lecture Notes in Computer Science, vol 5912, (Springer, 2009) pp. 685–702 F. Armknecht, R. Maes, A.R. Sadeghi, B. Sunar, P. Tuyls, in Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions. Proceedings of ASIACRYPT 2009. Lecture Notes in Computer Science, vol 5912, (Springer, 2009) pp. 685–702
2.
Zurück zum Zitat C. Bösch, J. Guajardo, A.-R. Sadeghi, J. Shokrollahi, P. Tuyls, in Efficient Helper Data Key Extractor on FPGAs. Proceedings of CHES 2008. Lecture Notes in Computer Science, vol. 5154 (Springer, Heidelberg, 2008), pp. 181–197 C. Bösch, J. Guajardo, A.-R. Sadeghi, J. Shokrollahi, P. Tuyls, in Efficient Helper Data Key Extractor on FPGAs. Proceedings of CHES 2008. Lecture Notes in Computer Science, vol. 5154 (Springer, Heidelberg, 2008), pp. 181–197
3.
Zurück zum Zitat B. Gassend, D.E. Clarke, M. van Dijk, S. Devadas, in Controlled Physical Random Functions. Proceedings of the18th Annual Computer Security Applications Conference (ACSAC 2002), Las Vegas, NV, USA, 9–13 Dec 2002 (IEEE Computer Society, Washington, DC, 2002), pp. 149–160 B. Gassend, D.E. Clarke, M. van Dijk, S. Devadas, in Controlled Physical Random Functions. Proceedings of the18th Annual Computer Security Applications Conference (ACSAC 2002), Las Vegas, NV, USA, 9–13 Dec 2002 (IEEE Computer Society, Washington, DC, 2002), pp. 149–160
4.
Zurück zum Zitat M.A. Gora, A. Maiti, P. Schaumont, in A Flexible Design Flow for Software IP Binding in Commodity FPGA. IEEE Fourth International Symposium on Industrial Embedded Systems - SIES 2009, Ecole Polytechnique Federale de Lausanne, Switzerland, 8–10 July 2009 (IEEE, Piscataway, NJ, 2009) pp. 211–218 M.A. Gora, A. Maiti, P. Schaumont, in A Flexible Design Flow for Software IP Binding in Commodity FPGA. IEEE Fourth International Symposium on Industrial Embedded Systems - SIES 2009, Ecole Polytechnique Federale de Lausanne, Switzerland, 8–10 July 2009 (IEEE, Piscataway, NJ, 2009) pp. 211–218
5.
Zurück zum Zitat J. Guajardo, S.S. Kumar, G.-J. Schrijen, P. Tuyls, FPGA intrinsic PUFs and their use for IP protection, in Cryptographic Hardware and Embedded Systems - CHES 2007, ed. by P. Paillier, I. Verbauwhede. Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, Vienna, Austria, 10–13 Sept 2007. Lecture Notes in Computer Science, vol. 4727, (Springer, Berlin, Heidelberg, 2007), pp. 63–80CrossRef J. Guajardo, S.S. Kumar, G.-J. Schrijen, P. Tuyls, FPGA intrinsic PUFs and their use for IP protection, in Cryptographic Hardware and Embedded Systems - CHES 2007, ed. by P. Paillier, I. Verbauwhede. Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, Vienna, Austria, 10–13 Sept 2007. Lecture Notes in Computer Science, vol. 4727, (Springer, Berlin, Heidelberg, 2007), pp. 63–80CrossRef
6.
Zurück zum Zitat J. Guajardo, S.S. Kumar, G.J. Schrijen, P. Tuyls, in Brand and IP Protection with Physical Unclonable Functions. IEEE International Symposium on Circuits and Systems - ISCAS 2008, 18–21 May (IEEE, Piscataway, NJ 2008), pp. 3186–3189 J. Guajardo, S.S. Kumar, G.J. Schrijen, P. Tuyls, in Brand and IP Protection with Physical Unclonable Functions. IEEE International Symposium on Circuits and Systems - ISCAS 2008, 18–21 May (IEEE, Piscataway, NJ 2008), pp. 3186–3189
7.
Zurück zum Zitat J. Guajardo, B. Skoric, S.S. Kumar, T. Bel, A.H.M. Blom, G.J. Schrijen, â̂IJAnti-counterfeiting, key distribution and key storage in an ambient world via physical unclonable functions. Inf. Syst. Front. 11(1), 19–41 (2009).CrossRef J. Guajardo, B. Skoric, S.S. Kumar, T. Bel, A.H.M. Blom, G.J. Schrijen, â̂IJAnti-counterfeiting, key distribution and key storage in an ambient world via physical unclonable functions. Inf. Syst. Front. 11(1), 19–41 (2009).CrossRef
8.
Zurück zum Zitat T. Jun, Circuit Approaches to Physical Cryptography. Diploma thesis, Technische Universitaet Muenchen, 2009 T. Jun, Circuit Approaches to Physical Cryptography. Diploma thesis, Technische Universitaet Muenchen, 2009
9.
Zurück zum Zitat S.S. Kumar, J. Guajardo, R. Maes, G.-J. Schrijen, P. Tuyls, in The Butterfly PUF: Protecting IP on Every FPGA, ed. by M. Tehranipoor, J. Plusquellic. Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2008, Anaheim, CA, USA, 9 June 2008 (IEEE Computer Society, Washington, DC, 2008), pp. 67–70CrossRef S.S. Kumar, J. Guajardo, R. Maes, G.-J. Schrijen, P. Tuyls, in The Butterfly PUF: Protecting IP on Every FPGA, ed. by M. Tehranipoor, J. Plusquellic. Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2008, Anaheim, CA, USA, 9 June 2008 (IEEE Computer Society, Washington, DC, 2008), pp. 67–70CrossRef
10.
Zurück zum Zitat K. Kursawe, A.R. Sadeghi, D. Schellekens, B. Skoric, P. Tuyls, in Reconfigurable Physical Unclonable Functions - Enabling Technology for Tamper-Resistant Storage. 2nd IEEE International Workshop on Hardware-Oriented Security and Trust (HOST 2009), San Francisco CA, USA, 27 July 2009 (IEEE, Piscataway, NJ, 2009), pp. 22–29 K. Kursawe, A.R. Sadeghi, D. Schellekens, B. Skoric, P. Tuyls, in Reconfigurable Physical Unclonable Functions - Enabling Technology for Tamper-Resistant Storage. 2nd IEEE International Workshop on Hardware-Oriented Security and Trust (HOST 2009), San Francisco CA, USA, 27 July 2009 (IEEE, Piscataway, NJ, 2009), pp. 22–29
11.
Zurück zum Zitat J.W. Lee, D. Lim, B. Gassend, G.E. Suh, M. van Dijk, S. Devadas, in A Technique to Build a Secret Key in Integrated Circuits for Identification and Authentication Applications. Proceedings of the IEEE VLSI Circuits Symposium, Honolulu, HI, June 2004, pp. 176–179 J.W. Lee, D. Lim, B. Gassend, G.E. Suh, M. van Dijk, S. Devadas, in A Technique to Build a Secret Key in Integrated Circuits for Identification and Authentication Applications. Proceedings of the IEEE VLSI Circuits Symposium, Honolulu, HI, June 2004, pp. 176–179
12.
Zurück zum Zitat D. Lim, Extracting Secret Keys from Integrated Circuits. Master thesis, Massachusetts Institute of Technology, May 2004 D. Lim, Extracting Secret Keys from Integrated Circuits. Master thesis, Massachusetts Institute of Technology, May 2004
13.
Zurück zum Zitat R. Maes, P. Tuyls, I. Verbauwhede, in Intrinsic PUFs from Flip-Flops on Reconfigurable Devices. 3rd Benelux Workshop on Information and System Security (WISSec 2008) Eindhoven, The Netherlands, 13–14 Nov 2008 17 pages R. Maes, P. Tuyls, I. Verbauwhede, in Intrinsic PUFs from Flip-Flops on Reconfigurable Devices. 3rd Benelux Workshop on Information and System Security (WISSec 2008) Eindhoven, The Netherlands, 13–14 Nov 2008 17 pages
14.
Zurück zum Zitat R. Maes, P. Tuyls, I. Verbauwhede, in Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs. Proceedings of CHES 2009, Lecture Notes in Computer Science, vol. 5747 (Springer, Berlin, Heidelberg, 2009), pp. 332–347 R. Maes, P. Tuyls, I. Verbauwhede, in Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs. Proceedings of CHES 2009, Lecture Notes in Computer Science, vol. 5747 (Springer, Berlin, Heidelberg, 2009), pp. 332–347
15.
Zurück zum Zitat C.W. O’Donnell, G.E. Suh, S. Devadas, PUF-Based Random Number Generation, CSAIL CSG Technical Memo 481, Massachusetts Institute of Technology, Mar 2001 C.W. O’Donnell, G.E. Suh, S. Devadas, PUF-Based Random Number Generation, CSAIL CSG Technical Memo 481, Massachusetts Institute of Technology, Mar 2001
16.
Zurück zum Zitat R.S. Pappu, Physical One-Way Functions. Ph.D. thesis, Massachusetts Institute of Technology, Mar 2001 R.S. Pappu, Physical One-Way Functions. Ph.D. thesis, Massachusetts Institute of Technology, Mar 2001
17.
Zurück zum Zitat B. Skoric, G.-J. Schrijen, W. Ophey, R. Wolters, N. Verhaegh, J. van Geloven, Experimental hardware for coating PUFs and optical PUFs, in Security with Noisy Data - On Private Biometrics, Secure Key Storage and Anti-Counterfeiting, ed. by P. Tuyls, B. Skoric, T. Kevenaar (Springer, London, 2007), pp. 255–268CrossRef B. Skoric, G.-J. Schrijen, W. Ophey, R. Wolters, N. Verhaegh, J. van Geloven, Experimental hardware for coating PUFs and optical PUFs, in Security with Noisy Data - On Private Biometrics, Secure Key Storage and Anti-Counterfeiting, ed. by P. Tuyls, B. Skoric, T. Kevenaar (Springer, London, 2007), pp. 255–268CrossRef
18.
Zurück zum Zitat B. Skoric, P. Tuyls, W. Ophey, in Robust Key Extraction from Physical Unclonable Functions. Applied Cryptography and Network Security (ACNS) 2005, Lecture Notes in Computer Science, vol. 3531 (Springer, Heidelberg, 2005), pp. 407–422 B. Skoric, P. Tuyls, W. Ophey, in Robust Key Extraction from Physical Unclonable Functions. Applied Cryptography and Network Security (ACNS) 2005, Lecture Notes in Computer Science, vol. 3531 (Springer, Heidelberg, 2005), pp. 407–422
19.
Zurück zum Zitat G.E. Su, S. Devadas, in Physical Unclonable Functions for Device Authentication and Secret Key Generation. Proceedings of the 44th Design Automation Conference, DAC 2007, San Diego, CA, USA, 4–8 June, (IEEE, Piscataway, NJ, 2007), pp. 9–14 G.E. Su, S. Devadas, in Physical Unclonable Functions for Device Authentication and Secret Key Generation. Proceedings of the 44th Design Automation Conference, DAC 2007, San Diego, CA, USA, 4–8 June, (IEEE, Piscataway, NJ, 2007), pp. 9–14
20.
Zurück zum Zitat P. Tuyls, G.J. Schrijen, F. Willems, T. Ignatenko, Secure key storage with PUFs, in Security with Noisy Data - On Private Biometrics, Secure Key Storage and Anti-Counterfeiting ed. by P. Tuyls, B. Skoric, T. Kevenaar. (Springer, London, 2007), pp. 269–292CrossRef P. Tuyls, G.J. Schrijen, F. Willems, T. Ignatenko, Secure key storage with PUFs, in Security with Noisy Data - On Private Biometrics, Secure Key Storage and Anti-Counterfeiting ed. by P. Tuyls, B. Skoric, T. Kevenaar. (Springer, London, 2007), pp. 269–292CrossRef
21.
Zurück zum Zitat P. Tuyls, B. Skoric, T. Kevenaar, Security with Noisy Data. Private Biometrics, Secure Key Storage and Anti-Counterfeiting (Springer, London, 2007)CrossRef P. Tuyls, B. Skoric, T. Kevenaar, Security with Noisy Data. Private Biometrics, Secure Key Storage and Anti-Counterfeiting (Springer, London, 2007)CrossRef
22.
Zurück zum Zitat P. Tuyls, G.-J. Schrijen, B. Skoric, J. van Geloven, N. Verhaegh, R. Wolters, in Read-Proof Hardware from Protective Coatings. Proceedings of the Eighth International Workshop on Cryptographic Hardware and Embedded Systems (CHES ’06), Yokohama, Japan, 10–13 Oct, pp. 369–383 P. Tuyls, G.-J. Schrijen, B. Skoric, J. van Geloven, N. Verhaegh, R. Wolters, in Read-Proof Hardware from Protective Coatings. Proceedings of the Eighth International Workshop on Cryptographic Hardware and Embedded Systems (CHES ’06), Yokohama, Japan, 10–13 Oct, pp. 369–383
23.
Zurück zum Zitat P. Tuyls, B. Skoric, S. Stallinga, A.H.M. Akkermans, W. Ophey, Information-theoretic security analysis of physical unclonable functions. in Financial Cryptography and Data Security, ed. by A.S. Patrick, M. Yung. 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, 28 Febr –3 Mar 2005. Revised Papers, Lecture Notes in Computer Science, vol. 3570 (Springer, Berlin, Heidelberg, 2005), pp. 141–155CrossRef P. Tuyls, B. Skoric, S. Stallinga, A.H.M. Akkermans, W. Ophey, Information-theoretic security analysis of physical unclonable functions. in Financial Cryptography and Data Security, ed. by A.S. Patrick, M. Yung. 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, 28 Febr –3 Mar 2005. Revised Papers, Lecture Notes in Computer Science, vol. 3570 (Springer, Berlin, Heidelberg, 2005), pp. 141–155CrossRef
Metadaten
Titel
Hardware Intrinsic Security from Physically Unclonable Functions
verfasst von
Helena Handschuh
Geert-Jan Schrijen
Pim Tuyls
Copyright-Jahr
2010
Verlag
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-642-14452-3_2

Neuer Inhalt