Silicon physical random functions
Proceedings of the 9th ACM conference on Computer and communications security
Physical one-way functions
Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting
Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
SIAM Journal on Computing
FPGA Intrinsic PUFs and Their Use for IP Protection
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
Efficient Helper Data Key Extractor on FPGAs
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
Extended abstract: The butterfly PUF protecting IP on every FPGA
HST '08 Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust
Hardware intrinsic security from D flip-flops
Proceedings of the fifth ACM workshop on Scalable trusted computing
Towards Hardware-Intrinsic Security: Foundations and Practice
Towards Hardware-Intrinsic Security: Foundations and Practice
SP 800-90A. Recommendation for Random Number Generation Using Deterministic Random Bit Generators
SP 800-90A. Recommendation for Random Number Generation Using Deterministic Random Bit Generators
The context-tree weighting method: basic properties
IEEE Transactions on Information Theory
Soft decision error correction for compact memory-based PUFs using a single enrollment
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
Anti-counterfeiting with hardware intrinsic security
Proceedings of the Conference on Design, Automation and Test in Europe
Bias-based modeling and entropy analysis of PUFs
Proceedings of the 3rd international workshop on Trustworthy embedded devices
Hi-index | 0.00 |
Hardware security is an essential tool in the prevention of cloning, theft of service and tampering. This security is often based on cryptographic primitives, which use a key that is securely stored somewhere in the hardware. The strength of the security is therefore dependent upon the effort required from an attacker to compromise this key. Since the tools used to carry out attacks on hardware have increased significantly over the years, the protection provided by simply storing a key in memory has decreased to a minimum. In order to protect devices against attacks on their keys, Hardware Intrinsic Security (HIS) can be used. One of the best known types of HIS primitives are Physically Unclonable Functions (PUFs). PUFs are primitives that extract secrets from physical characteristics of integrated circuits (ICs) and can be used, amongst others, in secure key storage implementations. This paper describes the results of our study on two important types of intrinsic PUFs, based on SRAM and D flip-flops. Both memory types present a specific start-up pattern (when powered up), which can be used as a PUF. For secure practical applications, a PUF should possess enough reliability for a single device and enough randomness between different devices. In this paper, a general test framework is proposed for measuring this reliability and randomness of both PUF types. Based on this framework, tests have been performed on PUFs in 65nm ICs and results are presented and compared between PUF types. From these results it can be concluded that SRAMs are slightly outperforming D flip-flop memories when it comes to usage for PUF implementations.