Science topic

Physical Unclonable Functions - Science topic

Explore the latest publications in Physical Unclonable Functions, and find Physical Unclonable Functions experts.
Filters
All publications are displayed by default. Use this filter to view only publications with full-texts.
Publications related to Physical Unclonable Functions (2,249)
Sorted by most recent
Conference Paper
Distance Bounding (DB) is designed to mitigate relay attacks. This paper provides a complete study of the DB protocol of Kleber et al. based on Physical Unclonable Functions (PUFs). We contradict the claim that it resists to Terrorist Fraud (TF). We propose some slight modifications to increase the security of the protocol and formally prove TF-res...
Article
A unique set of characteristics are packed in emerging nonvolatile reduction-oxidation (redox)-based resistive switching memories (ReRAMs) such as their underlying stochastic switching processes alongside their intrinsic highly nonlinear current-voltage characteristic, which in addition to known nano-fabrication process variation make them a promis...
Article
Error correction is an indispensable component when Physical Unclonable Functions (PUFs) are used in cryptographic applications. So far, there exist schemes that obtain helper data, which they need within the error correction process. We introduce a new scheme, which only uses an error correcting code without any further helper data. The main idea...
Conference Paper
Resistive random access memories (RRAMs) have arisen as a competitive candidate for non-volatile memories due to their scalability, simple structure, fast switching speed and compatibility with conventional back-end processes. The stochastic switching mechanism and intrinsic variability of RRAMs still poses challenges that must be overcome prior to...
Conference Paper
This paper describes the evaluation of available experimental boards, the comparison of their supported set of experiments and other aspects. The second part of this evaluation is focused on the design process of the PCB (Printed Circuit Board) for an FPGA (Field Programmable Gate Array) based cryptography environment suitable for evaluating the la...
Conference Paper
Printed Circuit Boards (PCBs) are easy target for reverse engineering and counterfeiting attacks due to the distributed supply chain. The integrated circuits (ICs) authentication techniques such as Physically Unclonable Function (PUF) are not easily extendible to PCBs. In this paper, we analyze various sources of variations in PCB and qualitatively...
Conference Paper
Physical Unclonable Function (PUF), an anti-counterfeit technology for semiconductor chips, has come under focus in recent years. We proposed a method of enhancing the entropy of a latch-based PUF response and confirmed its effectiveness by experimenting with prototype latch-based PUFs for 180 nm CMOS ASICs. In this paper, we fabricated latch-based...
Article
Physical Unclonable Functions (PUFs) are promising hardware security primitives which produce unique signatures. Out of several delay based PUF circuits, Configurable Ring Oscillator (CRO) PUF has got higher uniqueness and it is resilient against modelling attacks. In this paper, we present a novel Current controlled CRO (C-CRO) PUF in which invert...
Conference Paper
Physical Unclonable Functions (PUFs) measure manufacturing variations inside integrated circuits to derive internal secrets during run-time and avoid to store secrets permanently in non-volatile memory. PUF responses are noisy such that they require error correction to generate reliable cryptographic keys. To date, when needed one single key is rep...
Conference Paper
Physical Unclonable Function (PUF) is a promising hardware security primitive with broad application prospect. However, the strong PUF with numerous Challenge and Response Pairs (CRPs), e.g. the arbiter PUF, is vulnerable to modeling attacks. There are two major kinds of countermeasures. One is restricting CRP access interface, such as controlled P...
Conference Paper
A key requirement for most security solutions is to provide secure cryptographic key storage in a way that will easily scale in the age of the Internet of Things. In this paper, we focus on providing such a solution based on Physical Unclonable Functions (PUFs). To this end, we focus on microelectromechanical systems (MEMS)-based gyroscopes and sho...
Conference Paper
Physically Unclonable Function (PUF) is cost effective and reliable security primitives widely used in authentication and in-place secret key generation. With growing research in the area of non-CMOS technologies for memories and circuits, it is important to understand their implications on the design of security primitives. Resistive Random Access...
Conference Paper
We present a practical and highly secure method for the authentication of chips based on a new concept for implementing strong Physical Unclonable Function (PUF) on field programmable gate arrays (FPGA). Its qualitatively novel feature is a remote reconfiguration in which the delay stages of the PUF are arranged to a random pattern within a subset...
Conference Paper
The semiconductor counterfeiting has become a serious problem. Several Physical Unclonable Functions (PUFs), which utilizes the variation when manufacturing, are proposed as a countermeasure for imitation electronics. An arbiter PUF is one of the most popular PUFs. The operation of an arbiter PUF can be expressed by using a delay model. An arbiter...
Conference Paper
Physical Unclonable Functions (PUFs) are the state-of-the-art topic in hardware oriented security and trust (HOST). PUFs have recently emerged as a promising solution for cyber security related issues including low-cost chip authentication, hacking of digital systems and tampering of physical systems. In this paper, a dynamic area efficient design...
Conference Paper
Physically Unclonable Functions (PUFs) have proved to be effective and low-cost measure against counterfeiting by providing device authentication and secure key storage services. Memory based PUF implementations are an attractive option due to the ubiquitous nature of memory in electronic devices and the requirement of minimal (or no) additional ci...
Conference Paper
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such as sensors nodes and actuators, which are linked to the Internet. By 2020 it is anticipated that the IoT paradigm will include approximately 20 billion connected devices. The interconnection of such devices provides the ability to collect a huge amou...
Article
A physically unclonable function (PUF) is an irreversible probabilistic function that produces a random bit string. It is simple to implement but hard to predict and emulate. PUFs have been widely proposed as security primitives to provide device identification and authentication. In this paper, we propose a novel dynamic-memory-based PUF [dynamic...
Conference Paper
Multimedia authentication is an integral part of multimedia signal processing in many real-time and security sensitive applications, such as video surveillance. In such applications, a full-fledged video digital rights management (DRM) mechanism is not applicable due to the real time requirement and the difficulties in incorporating complicated lic...
Conference Paper
Electronic payment (e-payment) has been widely applied to electronic commerce and has especially attracted a large number of mobile users. However, current solutions often focus on protecting users’ money security without concerning the issue of users’ privacy leakage. In this paper, we propose AEP-M, a practical anonymous e-payment scheme specific...
Article
Globalization of semiconductor manufacturing and related activities has led to several security issues like counterfeiting, IP infringement and cloning etc. Counterfeiting not only affects the business and reputation of semiconductor vendor, it will affect the reliability of critical applications. Internet of Things (IoT's) is an emerging applicati...
Conference Paper
SR-Latch Physically Unclonable Function (PUF) is the most popular FPGA-based implementation for cryptographic applications. The implementation of a symmetric unbiased SR-Latch PUF is a difficult task due to some restrictions that are imposed on the FPGA implementation. Researchers have proposed different implementation methods which require increas...
Conference Paper
Nowadays, Physically Unclonable Functions (PUFs) are widely used in hardware security applications such as device authentication, secret key generation and recently as a novel approach for securing Internet of Things (IoT) devices. Different methods have been proposed to create a unique binary string based on the PUF properties of silicon Integrate...
Article
In this paper, a Glitch-PUF circuit technique is proposed by taking into consideration various aspects i.e. the signal transmission theory, race and hazard phenomenon, and Physical Unclonable Functions (PUF). First and foremost, the glitch circuit is obtained under the signal transmission theory. Using the combinational logic circuit propagation de...
Conference Paper
Devices in the internet of things (IoT) are frequently (i) resource-constrained, and (ii) deployed in unmonitored, physically unsecured environments. Securing these devices requires tractable cryptographic protocols, as well as cost effective tamper resistance solutions. We propose and evaluate cryptographic protocols that leverage physical unclona...
Conference Paper
A Physically Unclonable Function (PUF) is a unique and stable physical characteristic of a piece of hardware, which emerges due to variations in the fabrication processes. Prior works have demonstrated that PUFs are a promising cryptographic primitive to enable secure key storage, hardware-based device authentication and identification. So far, mos...
Conference Paper
Field Programmable Gate Arrays (FPGAs) have been the target of different physical attacks in recent years. Many different countermeasures have already been integrated into these devices to mitigate the existing vulnerabilities. However, there has not been enough attention paid to semi-invasive attacks from the IC backside due to the following reaso...
Conference Paper
In this work, we present probability based response generation schemes for MUX based Physical Unclonable Functions (PUFs). Compared to previous implementations where temporal majority voting (TMV) based on limited samples and coarse criteria was utilized to determine final responses, our design can collect soft responses with detailed probability i...
Conference Paper
Recent literature has demonstrated that the security of Physically Unclonable Function (PUF) circuits might be adversely affected by the introduction of faults. In this paper, we propose novel and efficient architectures for a variety of widely used delay-based PUFs which are robust against high precision laser fault attacks proposed by Tajik et al...
Article
This paper presents a technique for designing an ultra-compact and robust physically unclonable function for security-oriented applications. The circuits are based on pairs of analog circuits whose output voltage is supply voltage compensated and proportional to absolute temperature (PTAT). The difference between two outputs of a PTAT pair is digit...
Conference Paper
Silicon Physical Unclonable Functions (PUFs) have emerged as novel cryptographic primitives, with the ability to generate unique chip identifiers and cryptographic keys by exploiting intrinsic manufacturing process variations. The “Two Choose One” PUF (TCO-PUF) has recently been proposed. It is based on a differential architecture and exploits the...
Conference Paper
Physically Unclonable Functions (PUFs) were introduced over a decade ago for a variety of security applications. Silicon PUFs exploit uncontrollable random variations from manufacturing to generate unique and random signatures/responses. Existing research on PUFs has focused on either PUF design at the architectural level or optimization of lithogr...
Conference Paper
Resistive random access memories (RRAMs)have arisen as a competitive candidate for non-volatile memories due to their scalability, simple structure, fast switching speed and compatibility with conventional back-end processes. The stochastic switching mechanism and intrinsic variability of RRAMs will poses challenges that must be overcome prior to t...
Conference Paper
Physical Unclonable Functions (PUF) offer promising solution to security problems. A PUF is a die-specific random probabilistic function that is unique for every instance of the die. PUFs derive their randomness from the uncontrolled random manufacturing process variations in the IC. Apart from spatial variation or process variation, ICs are affect...
Conference Paper
There is a rapidly growing interest in the field of unmanned road vehicles across the world. To aid the traffic management of such systems, there is an urgent need to develop appropriate security protocols facilitating car-to-car and car-to-traffic controller systems. Ensuring security requires both confidentiality (will be understandable only to i...
Article
Physical Unclonable Functions (PUF) exploits process variation across same structure and design parameter unit circuits during the manufacturing processes to generate numerous unique, random and unclonable security keys. In this paper, a configurable resistance divider type DAC-PUF scheme is proposed, which consists of input register, resistor-stri...
Conference Paper
In this paper, a novel voice based User-Device (UD-) physical unclonable function (PUF) is demonstrated. In traditional PUFs, variability of challenge-response pairs (CRPs) only comes from physical randomness of silicon. Recently, a new type of PUF, touch screen based UD-PUF is proposed, which entangles human user biometric variability with the sil...
Conference Paper
Physical Unclonable Functions (PUFs) use random physical variations to map input challenges to output responses in a way that is unique to each chip. PUFs are promising low cost security primitives but unreliability of outputs limits the practical applications of PUFs. This work addresses two causes of unreliability: environmental noise and device...
Article
The physical unclonable function (PUF) is a promising innovative hardware security primitive that leverages the inherent randomness in the physical systems to produce unique responses upon the inquiry of challenges, thus the PUF could serve as a fingerprint for device authentication. In this paper, we propose a novel PUF implementation exploiting t...
Article
Physical Unclonable Functions (PUF) exploits process variation across the same structure circuits during the manufacturing processes to generate numerous unique, random and unclonable security keys. In this paper, a multi-port configurable PUF scheme is proposed, which is based on random deviation of current mirrors. It consists of input register,...
Conference Paper
When subject to natural effects such as aging, temperature changes, bias voltages drifts, or electrostatic interferences, the profile of the Physically Unclonable Functions (PUF) Challenge-Response-Pairs (CRPs) error rates is made predictable. Here we propose PUFs with multi-states and a Machine Learning Engine (MLE) that enable us to learn the beh...
Article
We introduce a new cryptographic primitive for noise tolerant template security. Our primitive consists of two algorithms. The first algorithm extracts a noise tolerant and secure template of fixed length binary data. The noise tolerance of our scheme follows from the second algorithm that determines whether two templates originate from a pair of d...
Conference Paper
Physical Unclonable Function (PUF) is attracted attention as a countermeasure for imitation electronics. PUF makes unique IDs using the variations when LSI manufacturing. On the other hand, lightweight block ciphers are proposed as security module for IoT devices. This study verifies the feasibility of security module using a lightweight block ciph...
Conference Paper
This paper presents an approach for enhancing the security of key hierarchy in the Trusted Platform Module (TPM) by utilizing the Static Random Access Memory (SRAM) based Physical Unclonable Functions (PUFs) technology and shows that it can make TPM's Endorsement Key extraction attacks extremely hard. We also provide a plan that implements our SRAM...
Conference Paper
With the emergence of the internet of things (IoT) and participatory sensing (PS) paradigms trustworthiness of remotely sensed data has become a vital research question. In this work, we present the design of a trusted sensor, which uses physically unclonable functions (PUFs) as anchor to ensure integrity, authenticity and non-repudiation guarantee...
Conference Paper
Authentication of electronic devices has become critical. Hardware authentication is one way to enhance security of a chip. Along with software, it makes it harder for an intruder to access any computer, smart-phone, or other devices without authorization. One way of authenticating a device through hardware is to use the fabrication anomalies, whic...
Conference Paper
Inherent stochastic physical mechanisms in emerging nonvolatile memories (NVMs), such as resistive random-access-memory (RRAM), have recently been explored for hardware security applications. Unlike the conventional silicon Physical Unclonable Functions (PUFs) that are solely based on manufacturing process variation, RRAM has some intrinsic randomn...
Article
Recent literature has demonstrated that the security of Physically Unclonable Function (PUF) circuits might be adversely affected by the introduction of faults. In this paper, we propose novel and efficient architectures for a variety of widely used delay-based PUFs which are robust against high precision laser fault attacks proposed by Tajik et al...
Article
The Lightweight Secure Physically Unclonable Function (LSPUF) was proposed as a secure composition of Arbiter PUFs with additional XOR based input and output networks. But later, researchers proposed a Machine Learning (ML) based modeling attack on x-XOR LSPUF, and they also empirically showed that pure ML based modeling is not computationally scal...
Conference Paper
Physically Unclonable functions (PUFs) is a new type of authenticating a device or chip such that it provides security with the inherent manufacturing variations. The purpose of this project is to implement a delay based Physical Unclonable Function (PUF) device on FPGA and test its performance. The implementation of the PUF logic is done using com...
Conference Paper
In the recent years, silicon based Physical Unclonable Function (PUF) has evolved as one of the popular hardware security primitives. PUFs are a class of circuits that use the inherent variations in the Integrated Circuit (IC) manufacturing process to create unique and unclonable IDs. There are various security related applications of PUFs such as...
Conference Paper
The designs of Physically Unclonable Functions (PUFs) described in this paper are based on Resistive RAMs incorporating ternary states with the objective to reduce false negative authentications (FNA) with low Challenge-Response-Pair (CRP) error rates. Unlike other error correction method, the method is not increasing false positive authentications...
Conference Paper
In this work we present a comprehensive set of schemes to generate Physical Unclonable Functions (PUF) responses. Software scripts have been developed to generate the PUF IDs using five different schemes. We also propose a new set of PUF metrics that are based on the Worst Case (WC) PUF performance. Values of these metrics, for the Ring Oscillator...
Conference Paper
We propose an anonymous authentication scheme which security is based on Physical Unclonable Function. Our scheme is resistant to typical attacks mounted against regular systems with security based on computational assumptions. Its tampering and cloning resistance is based on the assumption that cloning of the PUF device is impossible. The scheme w...
Conference Paper
Automobiles gradually favors computers on wheels-complete with various advance safety facilities such as emergency brake assist, safety belts, airbags, Tire-pressure monitoring, etc. Internally automobiles consist of 70 and above Electronic Control Units (ECUs), which communicate with each other using in-vehicle network example- Controller Area Net...
Article
We present a fuzzy extractor whose security can be reduced to the hardness of Learning Parity with Noise (LPN) and can efficiently correct a constant fraction of errors in a biometric source with a 'noise-avoiding trapdoor.' Using this computational fuzzy extractor, we present a stateless construction of a cryptographically-secure Physical Unclonab...
Article
Far-field scattering of randomly deposited Au nanoparticles (NPs) is demonstrated as a physically unclonable optical function for anti-counterfeit applications in which the scattering patterns are easily produced yet impractical to replicate. Colloidal metal NPs are superb components for nanoscale labels owing to their small dimensions and intense...
Conference Paper
The use of Physically Unclonable Functions (PUFs) in cryptographic protocols attracted an increased interest over recent years. Since sound security analysis requires a concise specification of the alleged properties of the PUF, there have been numerous trials to provide formal security models for PUFs. However, all these approaches have been tailo...
Preprint
This paper presents a review of developments in the field of physical unclonable functions (PUFs) and provides a broad overview of different PUF instances. Firstly, it provides some general information about PUFs, for instance, the functional principle, their terminology and the advantages of PUFs. Next, it explains their properties and the metrics...
Conference Paper
With the development of Integrated Circuit (IC), it is a growing trend that the CPU and the FPGA are integrated into one chip. To improve the security of CPU+FPGA IC, we explore the reconfigurable feature of FPGA to implement a novel Dynamically Configured Physical Unclonable Function (DCPUF). PUF is a hardware security primitive that utilizes unpr...
Conference Paper
Fabrication process introduces some inherent variability to the attributes of transistors (in particular length, widths, oxide thickness). As a result, every chip is physically unique. Physical uniqueness of microelectronics components can be used for multiple security applications. Physically Unclonable Functions (PUFs) are built to extract the ph...
Article
A novel class of mono-stable static physically unclonable functions (PUFs) for secure key generation and chip identification is proposed. The fundamental concept is demonstrated through a 65 nm prototype that contains two different implementations, as well as several previously proposed PUFs to enable a fair comparison at iso-technology. From a sta...
Article
This paper proposes a theoretical study and a full overview of the design, evaluation and optimization of a PUF based on transient element ring oscillators (TERO-PUF). We show how, by following some simple design rules and strategies, designers can build and optimize a TERO-PUF with state of the art PUF characteristics in a standard CMOS technology...
Article
PUFs (Physical Unclonable Function) are increasingly used in proposals of security architectures for device identification and cryptographic key generation. Many PUF designs for FPGAs proposed up to this day are based on ring oscillators (RO). The classical approach is to compare frequencies of ROs and produce a single output bit from each pair of...
Article
The general concept of Physically Unclonable Functions (PUFs) has been nowadays widely accepted and adopted to meet the requirements of secure identification and key generation/storage for cryptographic ciphers. However, shattered by different attacks, e.g., modeling attacks, it has been proved that the promised security features of arbiter PUFs, i...
Article
Physically Unclonable Function (PUF) circuits are often vulnerable to mathematical model-building attacks. We theoretically quantify the advantage provided to an adversary by any training dataset expansion technique along the lines of security analysis of cryptographic hash functions. We present an algorithm to enumerate certain sets of delay const...
Conference Paper
One main problem encountered in the FPGA implementation of Arbiter based Physical Unclonable Function (A-PUF) is the response instability caused by the metastability of delay flip-flop. This paper presents a new multi-arbiter approach to extract more entropy to extend the number of response bits to a single challenge. New multi-arbiter schemes base...
Article
This paper introduces the notion of Architectural Bias, which can be used to measure the influence of the architecture of Arbiter Physically Unclonable Functions (APUFs) on the quality of its outputs. A PUF design with less architectural bias is better than one which has more architectural bias. Architectural bias is the bias in the challenge-respo...
Conference Paper
This work deals with key generation based on Physically Obfuscated Keys (POKs), i.e., a certain type of tamper-evident Physical Unclonable Function (PUF) that can be used as protection against invasive physical attacks. To design a protected device, one must take attacks such as probing of data lines or penetration of the physical security boundary...
Article
Physically Unclonable Function (PUF) is a promising solution to satisfy hardware security demands. Several structures have been proposed to generate a unique and unclonable key from a silicon chip. Delay-based and Memory-based PUFs are the most popular FPGA implementation of a PUF construction. In thissrudy we implement Anderson PUF, RO PUF and SR...
Chapter
Security and low power have emerged to become two essential requirements to modern design. The rapid growth of small form, mobile, and remote sensor network systems require secure and ultra-low power data collection and communication solutions due to their energy constraints. The physical unclonable functions (PUFs) have emerged as a popular new ty...
Article
Radio Frequency Identification (RFID) technology is an automated identification technology which is widely used to identify and track all kind of objects. However, it is a challenging task to design an authentication protocol because of the limited resource of Lightweight RFID tags. Recently, a lightweight RFID authentication protocol and an owners...
Conference Paper
The security of the implemented cryptographic algorithm in hardware has been certified to be vulnerable against physical-level Side-Channel analysis. As a typical countermeasure, dual-rail precharge logic theoretically thwarts Side-Channel analysis because of its compensated data-dependent fluctuations in observable power or EM traces. However the...
Article
Quantum Readout (QR) of Physical Unclonable Functions (PUFs) is a new technique for remotely authenticating objects, which has recently been demonstrated experimentally. The security is based on basic quantum information theoretic principles and holds under the assumption that the adversary cannot clone or physically emulate PUFs. We analyse the se...
Article
Probing attacks are serious threats on integrated circuits. Security products often include a protective layer called shield that acts like a digital fence. In this article, we demonstrate a new shield structure that is cryptographically secure. This shield is based on the lightweight block cipher and independent mesh lines to ensure the security a...
Article
PUF (Physically Unclonable Function) technologies attract attention as a candidate to prevent counterfeit chips. A latch PUF is known as a high performance PUF among various types of proposed PUFs. In this paper we describe an experiment on a invasive attack to a latch PUF consisting of RS latches, such as measuring the latch output by a probe cont...
Thesis
Physical Unclonable Functions (PUFs) are a promising new cryptographic primitive that leverage manufacturing variation to create unclonable secrets in embedded systems. In this case, the secret is no longer stored permanently in digital form, but rather as the physical properties of the manufactured chip. Further, the recent proposal of "Public Mod...
Article
We present a computationally efficient technique to build concise and accurate computational models for large (60 or more inputs, 1 output) Boolean functions, only a very small fraction of whose truth table is known during model building.We use Genetic Programming with Boolean logic operators, and enhance the accuracy of the technique using Reduced...
Article
Experiences from smart grid cyber-security incidents in the past decade have raised questions on the applicability and effectiveness of security measures and protection mechanisms applied to the grid. In this chapter we focus on the security measures applied under real circumstances in today's smart grid systems. Beginning from real world example i...
Conference Paper
Hardware-assisted security is emerging as a promising avenue for protecting computer systems. Hardware based solutions, such as Physical Unclonable Functions (PUF), enable system authentication by relying on the physical attributes of the silicon to serve as fingerprints. A variety of PUF designs have been proposed by researchers, with some gaining...
Conference Paper
Physical Unclonable Functions (PUF) are promising security primitives used to produce unique signature for Integrated circuit (IC) which are useful in hardware security and cryptographic applications. Out of several PUF proposed by researcher like Ring Oscillator (RO) PUF, Arbiter PUF, configurable RO (CRO) PUF etc. RO PUF is widely used because of...
Article
By analyzing the principle of process variations, a lightweight Physical Unclonable Function (PUF) circuit based on selectable cross-coupled inverters is proposed in this paper. Firstly, selectable cross-coupled inverters are chosen for two delay paths. Simultaneously, the circuit takes challenge signal to control each delay path. The PUF cell circ...
Conference Paper
As an alternative to tamper-resistant modules, PUFs (Physically Unclonable Functions) [1], [6], [7], [8], [9], [10], [11], [14], [15], [18], [25], [26] have received much attention due to their unclonable physical characteristics. In this paper, we propose key establishment (KE1 and KE2) protocols using PUFs which can mitigate side-channel attacks...
Article
In this letter, we propose a reliable design of physical unclonable function (PUF) exploiting resistive random access memory (RRAM). Unlike the conventional silicon PUFs based on manufacturing process variation, the randomness of RRAM PUF comes from the stochastic switching mechanism and intrinsic variability of the RRAM devices. RRAM PUF's charact...
Chapter
This chapter addresses some of the practical difficulties when designing a silicon-PUF based on CMOS technology. When designing such a PUF, and particularly in the case of an arbiter-PUF, particular care should be taken during the place and route phase. To ensure the properties of the PUF, full-custom back-end design may be required. This chapter g...
Article
This chapter presents a novel Physically Unclonable Function PUF called ‘Loop PUF ’(LPUF) which has been studied specifically to be easy to design, lightweight and reliable. The LPUF principle is based on a loop of controllable delay lines forming a unique ring oscillator. It offers a huge set of challenges as the identity extraction is performed b...
Article
In this chapter, we describe a secret key generator which uses a Physically Unclonable Function: the Loop–PUF (LPUF). After a short description of this latter, we will describe the concept and the architecture of our secure key generator (PUFKY). We will detail all its components and all the security analysis we made. We will finally show that the...