PUF-FSM: A Controlled Strong PUF

نویسندگان

  • Yansong Gao
  • Damith Chinthana Ranasinghe
چکیده

Physical unclonable functions (PUF), as hardware security primitives, exploit manufacturing randomness to extract instance-specific challenge (input) response (output) pairs (CRPs). Since its emergence, the community started pursuing a strong PUF primitive that is with large CRP space and resilient to modeling building attacks. A practical realization of a strong PUF is still challenging to date. This paper presents the PUF finite state machine (PUF-FSM) that is served as a practical controlled strong PUF realization. Previous controlled PUF designs have the difficulties of stabilizing the noisy PUF responses where the error correction logic is required. In addition, the helper data computed to assist error correction eventually leaks information, which poses the controlled PUF under the threaten of fault attacks or reliability-based attacks. The PUF-FSM easily gets around this problem by only employing error-free responses judiciously determined on demand in the absence of an Arbiter PUF that has a large CRP space. In addition, the access to the PUF-FSM is controlled by the trusted entity. Control in means of restricting challenges presented to the PUF and further preventing repeated response evaluations to gain unreliability side channel information are foundations of defensing the most powerful modeling attacks. The PUF-FSM goes beyond authentication and identification applications to such as key generations and advanced cryptographic applications built upon a shared key.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Machine Learning Attacks on PolyPUF, OB-PUF, RPUF, and PUF-FSM

A physically unclonable function (PUF) is a circuit of which the input– output behavior is designed to be sensitive to the random variations of its manufacturing process. This building block hence facilitates the authentication of any given device in a population of identically laid-out silicon chips, similar to the biometric authentication of a human. The focus and novelty of this work is the ...

متن کامل

A Formal Definition and a New Security Mechanism of Physical Unclonable Functions

The characteristic novelty of what is generally meant by a “physical unclonable function” (PUF) is precisely defined, in order to supply a firm basis for security evaluations and the proposal of new security mechanisms. A PUF is defined as a hardware device which implements a physical function with an output value that changes with its argument. A PUF can be clonable, but a secure PUF must be u...

متن کامل

Active and Passive Side-Channel Attacks on Delay Based PUF Designs

Physical Unclonable Functions (PUFs) have emerged as a lightweight alternative to traditional cryptography. The fact that no secret key needs to be stored in non-volatile memory makes PUFs especially well suited for embedded systems in which securely generating and storing secret keys is difficult and expensive. Compared to traditional cryptography, PUFs are often believed to be more resistant ...

متن کامل

Reliable, Secure, Efficient Physical Unclonable Functions

A Physical Unclonable Function (PUF) is a die specific random function that can be used in a number of secure IC applications including die identification/authentication and key generation. At the core of a silicon PUF is a circuit (the PUF core) that generates random bits. These bits are like a silicon biometric, unique across dies, but can be reliably reproduced multiple times on a die across...

متن کامل

UNBIAS PUF: A Physical Implementation Bias Agnostic Strong PUF

The Physical Unclonable Function (PUF) is a promising hardware security primitive because of its inherent uniqueness and low cost. To extract the device-specific variation from delay-based strong PUFs, complex routing constraints are imposed to achieve symmetric path delays; and systematic variations can severely compromise the uniqueness of the PUF. In addition, the metastability of the arbite...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1701.04137  شماره 

صفحات  -

تاریخ انتشار 2017