skip to main content
10.1145/1278480.1278484acmconferencesArticle/Chapter ViewAbstractPublication PagesdacConference Proceedingsconference-collections
Article

Physical unclonable functions for device authentication and secret key generation

Published:04 June 2007Publication History

ABSTRACT

Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets from physical characteristics of integrated circuits (ICs). We present PUF designs that exploit inherent delay characteristics of wires and transistors that differ from chip to chip, and describe how PUFs can enable low-cost authentication of individual ICs and generate volatile secret keys for cryptographic operations.

References

  1. R. Anderson and M. Kuhn. Tamper resistance - a cautionary note. In Proceedings of the 2nd USENIX Workshop on Electronic Commerce, November 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. R. Anderson and M. Kuhn. Low cost attacks on tamper resistant devices. In IWSP: International Workshop on Security Protocols, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. D. S. Boning and J. E. Chung. Statistical metrology: Understanding spatial variation in semiconductor manufacturing. In Proceedings of SPIE 1996 Symposium on Microelectronic Manufacturing, 1996.Google ScholarGoogle Scholar
  4. K. A. Bowman, S. G. Duvall, and J. D. Meindl. Impact of die-to-die and within die parameter fluctuations on the maximum clock frequency distribution for gigascale integration. Journal of Solid-State Circuits, 37(2): 183--190, February 2002.Google ScholarGoogle ScholarCross RefCross Ref
  5. B. Gassend, D. Clarke, M. van Dijk, and S. Devadas. Controlled physical random functions. In Proceedings of 18th Annual Computer Security Applications Conference, December 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. B. Gassend, D. Clarke, M. van Dijk, and S. Devadas. Silicon physical random functions. In Proceedings of the Computer and Communication Security Conference, November 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J.-W. Lee, D. Lim, B. Gassend, G. E. Suh, M. van Dijk, and S. Devadas. A technique to build a secret key in integrated circuits with identification and authentication applications. In Proceedings of the IEEE VLSI Circuits Symposium, June 2004.Google ScholarGoogle ScholarCross RefCross Ref
  8. D. Lim. Extracting secret keys from integrated circuits. Master's thesis, Massachusetts Institute of Technology, May 2004.Google ScholarGoogle Scholar
  9. K. Lofstrom, W. R. Daasch, and D. Taylor. Ic identification circuit using device mismatch. In Proceedings of ISSCC 2000, February 2000.Google ScholarGoogle ScholarCross RefCross Ref
  10. S. R. Nassif. Modeling and forecasting of manufacturing variations. In Proceedings of ASP-DAC 2001, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. C. W. O'Donnell, G. E. Suh, and S. Devadas. PUF-based random number generation. In MIT CSAIL CSG Technical Memo 481, November 2004.Google ScholarGoogle Scholar
  12. R. Pappu. Physical One-Way Functions. PhD thesis, Massachusetts Institute of Technology, 2001.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. B. Skoric, P. Tuyls, and W. Ophey. Robust key extraction from physical unclonable functions. In Proceedings of the Applied Cryptography and Network Security Conference 2005, volume 3531 of Lecture Notes in Computer Science, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. S. P. Skorobogatov. Semi-invasive attacks - a new approach to hardware security analysis. In Technical Report UCAM-CL-TR-630. University of Cambridge Computer Laboratory, April 2005.Google ScholarGoogle Scholar
  15. S. W. Smith and S. H. Weingart. Building a high-performance, programmable secure coprocessor. Computer Networks (Special Issue on Computer Network Security), 31(8):831--860, April 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. G. E. Suh, C. W. O'Donnell, I. Sachdev, and S. Devadas. Design and implementation of the aegis single-chip secure processor using physical random functions. In Proceedings of the 32nd Annual International Symposium on Computer Architecture, June 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. P. Tuyls, B. Skoric, S. Stallinga, A. Akkermans, and W. Ophey. Information theoretical security analysis of physical unclonable functions. In Proceedings of Conference on Financial Cryptography and Data Security 2005, volume 3570 of Lecture Notes in Computer Science, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. B. S. Yee. Using Secure Coprocessors. PhD thesis, Carnegie Mellon University, 1994.Google ScholarGoogle Scholar

Index Terms

  1. Physical unclonable functions for device authentication and secret key generation

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        DAC '07: Proceedings of the 44th annual Design Automation Conference
        June 2007
        1016 pages
        ISBN:9781595936271
        DOI:10.1145/1278480

        Copyright © 2007 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 4 June 2007

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        DAC '07 Paper Acceptance Rate152of659submissions,23%Overall Acceptance Rate1,770of5,499submissions,32%

        Upcoming Conference

        DAC '24
        61st ACM/IEEE Design Automation Conference
        June 23 - 27, 2024
        San Francisco , CA , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader