ABSTRACT
Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets from physical characteristics of integrated circuits (ICs). We present PUF designs that exploit inherent delay characteristics of wires and transistors that differ from chip to chip, and describe how PUFs can enable low-cost authentication of individual ICs and generate volatile secret keys for cryptographic operations.
- R. Anderson and M. Kuhn. Tamper resistance - a cautionary note. In Proceedings of the 2nd USENIX Workshop on Electronic Commerce, November 1996. Google ScholarDigital Library
- R. Anderson and M. Kuhn. Low cost attacks on tamper resistant devices. In IWSP: International Workshop on Security Protocols, 1997. Google ScholarDigital Library
- D. S. Boning and J. E. Chung. Statistical metrology: Understanding spatial variation in semiconductor manufacturing. In Proceedings of SPIE 1996 Symposium on Microelectronic Manufacturing, 1996.Google Scholar
- K. A. Bowman, S. G. Duvall, and J. D. Meindl. Impact of die-to-die and within die parameter fluctuations on the maximum clock frequency distribution for gigascale integration. Journal of Solid-State Circuits, 37(2): 183--190, February 2002.Google ScholarCross Ref
- B. Gassend, D. Clarke, M. van Dijk, and S. Devadas. Controlled physical random functions. In Proceedings of 18th Annual Computer Security Applications Conference, December 2002. Google ScholarDigital Library
- B. Gassend, D. Clarke, M. van Dijk, and S. Devadas. Silicon physical random functions. In Proceedings of the Computer and Communication Security Conference, November 2002. Google ScholarDigital Library
- J.-W. Lee, D. Lim, B. Gassend, G. E. Suh, M. van Dijk, and S. Devadas. A technique to build a secret key in integrated circuits with identification and authentication applications. In Proceedings of the IEEE VLSI Circuits Symposium, June 2004.Google ScholarCross Ref
- D. Lim. Extracting secret keys from integrated circuits. Master's thesis, Massachusetts Institute of Technology, May 2004.Google Scholar
- K. Lofstrom, W. R. Daasch, and D. Taylor. Ic identification circuit using device mismatch. In Proceedings of ISSCC 2000, February 2000.Google ScholarCross Ref
- S. R. Nassif. Modeling and forecasting of manufacturing variations. In Proceedings of ASP-DAC 2001, 2001. Google ScholarDigital Library
- C. W. O'Donnell, G. E. Suh, and S. Devadas. PUF-based random number generation. In MIT CSAIL CSG Technical Memo 481, November 2004.Google Scholar
- R. Pappu. Physical One-Way Functions. PhD thesis, Massachusetts Institute of Technology, 2001.Google ScholarDigital Library
- B. Skoric, P. Tuyls, and W. Ophey. Robust key extraction from physical unclonable functions. In Proceedings of the Applied Cryptography and Network Security Conference 2005, volume 3531 of Lecture Notes in Computer Science, 2005. Google ScholarDigital Library
- S. P. Skorobogatov. Semi-invasive attacks - a new approach to hardware security analysis. In Technical Report UCAM-CL-TR-630. University of Cambridge Computer Laboratory, April 2005.Google Scholar
- S. W. Smith and S. H. Weingart. Building a high-performance, programmable secure coprocessor. Computer Networks (Special Issue on Computer Network Security), 31(8):831--860, April 1999. Google ScholarDigital Library
- G. E. Suh, C. W. O'Donnell, I. Sachdev, and S. Devadas. Design and implementation of the aegis single-chip secure processor using physical random functions. In Proceedings of the 32nd Annual International Symposium on Computer Architecture, June 2005. Google ScholarDigital Library
- P. Tuyls, B. Skoric, S. Stallinga, A. Akkermans, and W. Ophey. Information theoretical security analysis of physical unclonable functions. In Proceedings of Conference on Financial Cryptography and Data Security 2005, volume 3570 of Lecture Notes in Computer Science, 2005. Google ScholarDigital Library
- B. S. Yee. Using Secure Coprocessors. PhD thesis, Carnegie Mellon University, 1994.Google Scholar
Index Terms
- Physical unclonable functions for device authentication and secret key generation
Recommendations
Device Authentication by Physical Unclonable Functions
ICCUBEA '15: Proceedings of the 2015 International Conference on Computing Communication Control and AutomationPhysical Unclonable Functions (PUFs) are very efficient circuits which are able to extract secrets from physical characteristic of any integrated circuit (IC). Wires and transistors have inherent delay characteristics. PUF designs make use of these ...
Novel physical unclonable function with process and environmental variations
DATE '10: Proceedings of the Conference on Design, Automation and Test in EuropePhysical Unclonable Functions (PUFs) are employed to generate unique signature to be used for integrated circuit (IC) identification and authentication. Existing PUFs exploit only process variations for generating unique signature. Due to the spatial ...
Efficient fully homomorphic encryption with circularly secure key switching process
Fully homomorphic encryption (FHE) has important applications in cloud computing. However, almost all fully homomorphic encryption schemes share two common flaws that they all use large-scale secret keys and some operations are inefficient. In this paper,...
Comments